Search criteria

89 vulnerabilities found for LabVIEW by NI

CVE-2025-12097 (GCVE-0-2025-12097)

Vulnerability from cvelistv5 – Published: 2025-12-04 19:07 – Updated: 2025-12-08 20:50
VLAI?
Summary
There is a relative path traversal vulnerability in the NI System Web Server that may result in information disclosure.  Successful exploitation requires an attacker to send a specially crafted request to the NI System Web Server, allowing the attacker to read arbitrary files.  This vulnerability existed in the NI System Web Server 2012 and prior versions.  It was fixed in 2013.
CWE
  • CWE-23 - Relative Path Traversal
Assigner
NI
Impacted products
Vendor Product Version
NI LabVIEW Affected: 9.0.0 , ≤ 12.* (semver)
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-12097",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-12-08T20:50:14.740806Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-12-08T20:50:23.849Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "LabVIEW",
          "vendor": "NI",
          "versions": [
            {
              "lessThanOrEqual": "12.*",
              "status": "affected",
              "version": "9.0.0",
              "versionType": "semver"
            }
          ]
        }
      ],
      "cpeApplicability": [
        {
          "nodes": [
            {
              "cpeMatch": [
                {
                  "criteria": "cpe:2.3:a:ni:labview:*:*:*:*:*:*:*:*",
                  "versionEndIncluding": "12.*",
                  "versionStartIncluding": "9.0.0",
                  "vulnerable": true
                }
              ],
              "negate": false,
              "operator": "OR"
            }
          ],
          "operator": "OR"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eThere is a relative path traversal vulnerability in the NI System Web Server that may result in information disclosure. \u0026nbsp;Successful exploitation requires an attacker to send a specially crafted request to the NI System Web Server, allowing the attacker to read arbitrary files. \u0026nbsp;This vulnerability existed in the NI System Web Server 2012 and prior versions. \u0026nbsp;It was fixed in 2013. \u003c/span\u003e\u003cbr\u003e"
            }
          ],
          "value": "There is a relative path traversal vulnerability in the NI System Web Server that may result in information disclosure. \u00a0Successful exploitation requires an attacker to send a specially crafted request to the NI System Web Server, allowing the attacker to read arbitrary files. \u00a0This vulnerability existed in the NI System Web Server 2012 and prior versions. \u00a0It was fixed in 2013."
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-139",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-139 Relative Path Traversal"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        },
        {
          "cvssV4_0": {
            "Automatable": "NOT_DEFINED",
            "Recovery": "NOT_DEFINED",
            "Safety": "NOT_DEFINED",
            "attackComplexity": "LOW",
            "attackRequirements": "NONE",
            "attackVector": "NETWORK",
            "baseScore": 8.7,
            "baseSeverity": "HIGH",
            "exploitMaturity": "NOT_DEFINED",
            "privilegesRequired": "NONE",
            "providerUrgency": "NOT_DEFINED",
            "subAvailabilityImpact": "NONE",
            "subConfidentialityImpact": "NONE",
            "subIntegrityImpact": "NONE",
            "userInteraction": "NONE",
            "valueDensity": "NOT_DEFINED",
            "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N",
            "version": "4.0",
            "vulnAvailabilityImpact": "NONE",
            "vulnConfidentialityImpact": "HIGH",
            "vulnIntegrityImpact": "NONE",
            "vulnerabilityResponseEffort": "NOT_DEFINED"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-23",
              "description": "CWE-23- Relative Path Traversal",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-12-04T19:07:46.813Z",
        "orgId": "bca5b2e8-03a4-4781-b4ca-c6a078c0bfd4",
        "shortName": "NI"
      },
      "references": [
        {
          "url": "https://www.ni.com/en/support/security/available-critical-and-security-updates-for-ni-software/relative-path-traversal-vulnerability-in-ni-system-web-server.html"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "x_generator": {
        "engine": "Vulnogram 0.5.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "bca5b2e8-03a4-4781-b4ca-c6a078c0bfd4",
    "assignerShortName": "NI",
    "cveId": "CVE-2025-12097",
    "datePublished": "2025-12-04T19:07:46.813Z",
    "dateReserved": "2025-10-22T21:08:54.165Z",
    "dateUpdated": "2025-12-08T20:50:23.849Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2"
}

CVE-2025-7849 (GCVE-0-2025-7849)

Vulnerability from cvelistv5 – Published: 2025-07-29 21:27 – Updated: 2025-08-02 03:55
VLAI?
Summary
A memory corruption vulnerability due to improper error handling when a VILinkObj is null exists in NI LabVIEW that may result in arbitrary code execution. Successful exploitation requires an attacker to get a user to open a specially crafted VI. This vulnerability affects NI LabVIEW 2025 Q1 and prior versions.
CWE
Assigner
NI
Impacted products
Vendor Product Version
NI LabVIEW Affected: 0 , ≤ 22.3.5 (semver)
Affected: 23.0.0 , ≤ 23.3.6 (semver)
Affected: 24.0.0 , ≤ 24.3.3 (semver)
Affected: 25.0.0 , < 25.3.0 (semver)
Create a notification for this product.
Credits
Rocco Calvi (@TecR0c) with TecSecurity working with Trend Micro Zero Day Initiative
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-7849",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-08-01T00:00:00+00:00",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-08-02T03:55:48.802Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "LabVIEW",
          "vendor": "NI",
          "versions": [
            {
              "lessThanOrEqual": "22.3.5",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "23.3.6",
              "status": "affected",
              "version": "23.0.0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "24.3.3",
              "status": "affected",
              "version": "24.0.0",
              "versionType": "semver"
            },
            {
              "lessThan": "25.3.0",
              "status": "affected",
              "version": "25.0.0",
              "versionType": "semver"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "value": "Rocco Calvi (@TecR0c) with TecSecurity working with Trend Micro Zero Day Initiative"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\u003cp\u003eA memory corruption vulnerability due to improper error handling when a VILinkObj is null exists in NI LabVIEW that may result in arbitrary code execution.  Successful exploitation requires an attacker to get a user to open a specially crafted VI.  This vulnerability affects NI LabVIEW 2025 Q1 and prior versions.\u003c/p\u003e"
            }
          ],
          "value": "A memory corruption vulnerability due to improper error handling when a VILinkObj is null exists in NI LabVIEW that may result in arbitrary code execution.  Successful exploitation requires an attacker to get a user to open a specially crafted VI.  This vulnerability affects NI LabVIEW 2025 Q1 and prior versions."
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-23",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-23 File Content Injection"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        },
        {
          "cvssV4_0": {
            "Automatable": "NOT_DEFINED",
            "Recovery": "NOT_DEFINED",
            "Safety": "NOT_DEFINED",
            "attackComplexity": "LOW",
            "attackRequirements": "NONE",
            "attackVector": "LOCAL",
            "baseScore": 8.5,
            "baseSeverity": "HIGH",
            "privilegesRequired": "NONE",
            "providerUrgency": "NOT_DEFINED",
            "subAvailabilityImpact": "NONE",
            "subConfidentialityImpact": "NONE",
            "subIntegrityImpact": "NONE",
            "userInteraction": "PASSIVE",
            "valueDensity": "NOT_DEFINED",
            "vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
            "version": "4.0",
            "vulnAvailabilityImpact": "HIGH",
            "vulnConfidentialityImpact": "HIGH",
            "vulnIntegrityImpact": "HIGH",
            "vulnerabilityResponseEffort": "NOT_DEFINED"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-1285",
              "description": "CWE-1285",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-07-29T21:27:20.080Z",
        "orgId": "bca5b2e8-03a4-4781-b4ca-c6a078c0bfd4",
        "shortName": "NI"
      },
      "references": [
        {
          "url": "https://www.ni.com/en/support/security/available-critical-and-security-updates-for-ni-software/memory-corruption-vulnerabilities-in-ni-labview.html"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "title": "Memory Corruption Issue in NI LabVIEW due to improper error handling",
      "x_generator": {
        "engine": "Vulnogram 0.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "bca5b2e8-03a4-4781-b4ca-c6a078c0bfd4",
    "assignerShortName": "NI",
    "cveId": "CVE-2025-7849",
    "datePublished": "2025-07-29T21:27:20.080Z",
    "dateReserved": "2025-07-18T21:43:09.001Z",
    "dateUpdated": "2025-08-02T03:55:48.802Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2025-7848 (GCVE-0-2025-7848)

Vulnerability from cvelistv5 – Published: 2025-07-29 21:24 – Updated: 2025-08-02 03:55
VLAI?
Summary
A memory corruption vulnerability due to improper input validation in lvpict.cpp exists in NI LabVIEW that may result in arbitrary code execution. Successful exploitation requires an attacker to get a user to open a specially crafted VI. This vulnerability affects NI LabVIEW 2025 Q1 and prior versions.
CWE
  • CWE-1285 - Improper Validation of Specified Index, Position, or Offset in Input
Assigner
NI
Impacted products
Vendor Product Version
NI LabVIEW Affected: 0 , ≤ 22.3.5 (semver)
Affected: 23.0.0 , ≤ 23.3.6 (semver)
Affected: 24.0.0 , ≤ 24.3.3 (semver)
Affected: 25.0.0 , < 25.3.0 (semver)
Create a notification for this product.
Credits
Rocco Calvi (@TecR0c) with TecSecurity working with Trend Micro Zero Day Initiative
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-7848",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-08-01T00:00:00+00:00",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-08-02T03:55:47.625Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "LabVIEW",
          "vendor": "NI",
          "versions": [
            {
              "lessThanOrEqual": "22.3.5",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "23.3.6",
              "status": "affected",
              "version": "23.0.0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "24.3.3",
              "status": "affected",
              "version": "24.0.0",
              "versionType": "semver"
            },
            {
              "lessThan": "25.3.0",
              "status": "affected",
              "version": "25.0.0",
              "versionType": "semver"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "value": "Rocco Calvi (@TecR0c) with TecSecurity working with Trend Micro Zero Day Initiative"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\u003cp\u003eA memory corruption vulnerability due to improper input validation in lvpict.cpp exists in NI LabVIEW that may result in arbitrary code execution.  Successful exploitation requires an attacker to get a user to open a specially crafted VI.  This vulnerability affects NI LabVIEW 2025 Q1 and prior versions.\u003c/p\u003e"
            }
          ],
          "value": "A memory corruption vulnerability due to improper input validation in lvpict.cpp exists in NI LabVIEW that may result in arbitrary code execution.  Successful exploitation requires an attacker to get a user to open a specially crafted VI.  This vulnerability affects NI LabVIEW 2025 Q1 and prior versions."
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-23",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-23 File Content Injection"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        },
        {
          "cvssV4_0": {
            "Automatable": "NOT_DEFINED",
            "Recovery": "NOT_DEFINED",
            "Safety": "NOT_DEFINED",
            "attackComplexity": "LOW",
            "attackRequirements": "NONE",
            "attackVector": "LOCAL",
            "baseScore": 8.5,
            "baseSeverity": "HIGH",
            "privilegesRequired": "NONE",
            "providerUrgency": "NOT_DEFINED",
            "subAvailabilityImpact": "NONE",
            "subConfidentialityImpact": "NONE",
            "subIntegrityImpact": "NONE",
            "userInteraction": "PASSIVE",
            "valueDensity": "NOT_DEFINED",
            "vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
            "version": "4.0",
            "vulnAvailabilityImpact": "HIGH",
            "vulnConfidentialityImpact": "HIGH",
            "vulnIntegrityImpact": "HIGH",
            "vulnerabilityResponseEffort": "NOT_DEFINED"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-1285",
              "description": "CWE-1285 Improper Validation of Specified Index, Position, or Offset in Input",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-07-29T21:24:32.568Z",
        "orgId": "bca5b2e8-03a4-4781-b4ca-c6a078c0bfd4",
        "shortName": "NI"
      },
      "references": [
        {
          "url": "https://www.ni.com/en/support/security/available-critical-and-security-updates-for-ni-software/memory-corruption-vulnerabilities-in-ni-labview.html"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "title": "Missing input check in lvpict.cpp used in NI LabVIEW",
      "x_generator": {
        "engine": "Vulnogram 0.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "bca5b2e8-03a4-4781-b4ca-c6a078c0bfd4",
    "assignerShortName": "NI",
    "cveId": "CVE-2025-7848",
    "datePublished": "2025-07-29T21:24:32.568Z",
    "dateReserved": "2025-07-18T21:43:07.604Z",
    "dateUpdated": "2025-08-02T03:55:47.625Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2025-7361 (GCVE-0-2025-7361)

Vulnerability from cvelistv5 – Published: 2025-07-29 21:19 – Updated: 2025-08-02 03:55
VLAI?
Summary
A code injection vulnerability due to an improper initialization check exists in NI LabVIEW that may result in arbitrary code execution. Successful exploitation requires an attacker to get a user to open a specially crafted VI using a CIN node. This vulnerability affects 32-bit NI LabVIEW 2025 Q1 and prior versions. LabVIEW 64-bit versions do not support CIN nodes and are not affected.
CWE
  • CWE-94 - Improper Control of Generation of Code ('Code Injection')
Assigner
NI
Impacted products
Vendor Product Version
NI LabVIEW Affected: 0 , ≤ 22.3.5 (semver)
Affected: 23.0.0 , ≤ 23.3.6 (semver)
Affected: 24.0.0 , ≤ 24.3.3 (semver)
Affected: 25.0.0 , < 25.3.0 (semver)
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-7361",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-08-01T00:00:00+00:00",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-08-02T03:55:46.530Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "platforms": [
            "Windows",
            "32 bit"
          ],
          "product": "LabVIEW",
          "vendor": "NI",
          "versions": [
            {
              "lessThanOrEqual": "22.3.5",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "23.3.6",
              "status": "affected",
              "version": "23.0.0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "24.3.3",
              "status": "affected",
              "version": "24.0.0",
              "versionType": "semver"
            },
            {
              "lessThan": "25.3.0",
              "status": "affected",
              "version": "25.0.0",
              "versionType": "semver"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\u003cp\u003eA code injection vulnerability due to an improper initialization check exists in NI LabVIEW that may result in arbitrary code execution.  Successful exploitation requires an attacker to get a user to open a specially crafted VI using a CIN node.  This vulnerability affects 32-bit NI LabVIEW 2025 Q1 and prior versions.  LabVIEW 64-bit versions do not support CIN nodes and are not affected.\u003c/p\u003e"
            }
          ],
          "value": "A code injection vulnerability due to an improper initialization check exists in NI LabVIEW that may result in arbitrary code execution.  Successful exploitation requires an attacker to get a user to open a specially crafted VI using a CIN node.  This vulnerability affects 32-bit NI LabVIEW 2025 Q1 and prior versions.  LabVIEW 64-bit versions do not support CIN nodes and are not affected."
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-242",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-242 Code Injection"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        },
        {
          "cvssV4_0": {
            "Automatable": "NOT_DEFINED",
            "Recovery": "NOT_DEFINED",
            "Safety": "NOT_DEFINED",
            "attackComplexity": "LOW",
            "attackRequirements": "NONE",
            "attackVector": "LOCAL",
            "baseScore": 8.5,
            "baseSeverity": "HIGH",
            "privilegesRequired": "NONE",
            "providerUrgency": "NOT_DEFINED",
            "subAvailabilityImpact": "NONE",
            "subConfidentialityImpact": "NONE",
            "subIntegrityImpact": "NONE",
            "userInteraction": "PASSIVE",
            "valueDensity": "NOT_DEFINED",
            "vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
            "version": "4.0",
            "vulnAvailabilityImpact": "HIGH",
            "vulnConfidentialityImpact": "HIGH",
            "vulnIntegrityImpact": "HIGH",
            "vulnerabilityResponseEffort": "NOT_DEFINED"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-94",
              "description": "CWE-94 Improper Control of Generation of Code (\u0027Code Injection\u0027)",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-07-29T21:19:28.118Z",
        "orgId": "bca5b2e8-03a4-4781-b4ca-c6a078c0bfd4",
        "shortName": "NI"
      },
      "references": [
        {
          "url": "https://www.ni.com/en/support/security/available-critical-and-security-updates-for-ni-software/code-injection-vulnerability-in-ni-labview-using-cin-nodes.html"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "title": "Code Injection Vulnerability in NI LabVIEW when using CIN nodes",
      "x_generator": {
        "engine": "Vulnogram 0.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "bca5b2e8-03a4-4781-b4ca-c6a078c0bfd4",
    "assignerShortName": "NI",
    "cveId": "CVE-2025-7361",
    "datePublished": "2025-07-29T21:19:28.118Z",
    "dateReserved": "2025-07-08T16:56:14.380Z",
    "dateUpdated": "2025-08-02T03:55:46.530Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2025-2634 (GCVE-0-2025-2634)

Vulnerability from cvelistv5 – Published: 2025-07-23 15:53 – Updated: 2025-07-23 20:10
VLAI?
Summary
Out of bounds read vulnerability due to improper bounds checking in NI LabVIEW in fontmgr may result in information disclosure or arbitrary code execution. Successful exploitation requires an attacker to get a user to open a specially crafted VI. This vulnerability affects NI LabVIEW 2025 Q1 and prior versions.
CWE
  • CWE-1285 - Improper Validation of Specified Index, Position, or Offset in Input
Assigner
NI
Impacted products
Vendor Product Version
NI LabVIEW Affected: 0 , ≤ 22.3.5 (sem)
Affected: 23.0.0 , ≤ 23.3.6 (semver)
Affected: 24.0.0 , ≤ 24.3.3 (semver)
Affected: 25.0.0 , < 25.3.0 (semver)
Create a notification for this product.
Credits
Michael Heinzl working with CISA
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-2634",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-07-23T20:09:47.785454Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-07-23T20:10:00.301Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "platforms": [
            "Windows",
            "Linux"
          ],
          "product": "LabVIEW",
          "vendor": "NI",
          "versions": [
            {
              "lessThanOrEqual": "22.3.5",
              "status": "affected",
              "version": "0",
              "versionType": "sem"
            },
            {
              "lessThanOrEqual": "23.3.6",
              "status": "affected",
              "version": "23.0.0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "24.3.3",
              "status": "affected",
              "version": "24.0.0",
              "versionType": "semver"
            },
            {
              "lessThan": "25.3.0",
              "status": "affected",
              "version": "25.0.0",
              "versionType": "semver"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "value": "Michael Heinzl working with CISA"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\u003cp\u003eOut of bounds read vulnerability due to improper bounds checking in NI LabVIEW in fontmgr may result in information disclosure or arbitrary code execution.  Successful exploitation requires an attacker to get a user to open a specially crafted VI.  This vulnerability affects NI LabVIEW 2025 Q1 and prior versions.\u003c/p\u003e"
            }
          ],
          "value": "Out of bounds read vulnerability due to improper bounds checking in NI LabVIEW in fontmgr may result in information disclosure or arbitrary code execution.  Successful exploitation requires an attacker to get a user to open a specially crafted VI.  This vulnerability affects NI LabVIEW 2025 Q1 and prior versions."
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-100",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-100 Overflow Buffers"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        },
        {
          "cvssV4_0": {
            "Automatable": "NOT_DEFINED",
            "Recovery": "NOT_DEFINED",
            "Safety": "NOT_DEFINED",
            "attackComplexity": "LOW",
            "attackRequirements": "PRESENT",
            "attackVector": "LOCAL",
            "baseScore": 7.3,
            "baseSeverity": "HIGH",
            "privilegesRequired": "NONE",
            "providerUrgency": "NOT_DEFINED",
            "subAvailabilityImpact": "NONE",
            "subConfidentialityImpact": "NONE",
            "subIntegrityImpact": "NONE",
            "userInteraction": "PASSIVE",
            "valueDensity": "NOT_DEFINED",
            "vectorString": "CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
            "version": "4.0",
            "vulnAvailabilityImpact": "HIGH",
            "vulnConfidentialityImpact": "HIGH",
            "vulnIntegrityImpact": "HIGH",
            "vulnerabilityResponseEffort": "NOT_DEFINED"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-1285",
              "description": "CWE-1285 Improper Validation of Specified Index, Position, or Offset in Input",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-07-23T15:53:25.130Z",
        "orgId": "bca5b2e8-03a4-4781-b4ca-c6a078c0bfd4",
        "shortName": "NI"
      },
      "references": [
        {
          "url": "https://www.ni.com/en/support/security/available-critical-and-security-updates-for-ni-software/out-of-bounds-read-vulnerabilities-in-ni-labview.html"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "title": "Out of Bounds Read Vulnerability in NI LabVIEW when building font map",
      "x_generator": {
        "engine": "Vulnogram 0.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "bca5b2e8-03a4-4781-b4ca-c6a078c0bfd4",
    "assignerShortName": "NI",
    "cveId": "CVE-2025-2634",
    "datePublished": "2025-07-23T15:53:25.130Z",
    "dateReserved": "2025-03-21T21:15:19.488Z",
    "dateUpdated": "2025-07-23T20:10:00.301Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2025-2633 (GCVE-0-2025-2633)

Vulnerability from cvelistv5 – Published: 2025-07-23 15:49 – Updated: 2025-07-23 17:23
VLAI?
Summary
Out of bounds read vulnerability due to improper bounds checking in NI LabVIEW in lvre!UDecStrToNum that may result in information disclosure or arbitrary code execution. Successful exploitation requires an attacker to get a user to open a specially crafted VI. This vulnerability affects NI LabVIEW 2025 Q1 and prior versions.
CWE
  • CWE-1285 - Improper Validation of Specified Index, Position, or Offset in Input
Assigner
NI
Impacted products
Vendor Product Version
NI LabVIEW Affected: 0 , ≤ 22.3.5 (semver)
Affected: 23.0.0 , ≤ 23.3.6 (semver)
Affected: 24.0.0 , ≤ 24.3.3 (semver)
Affected: 25.0.0 , < 25.3.0 (semver)
Create a notification for this product.
Credits
Michael Heinzl working with CISA
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-2633",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-07-23T17:23:47.897012Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-07-23T17:23:55.255Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "platforms": [
            "Windows",
            "Linux"
          ],
          "product": "LabVIEW",
          "vendor": "NI",
          "versions": [
            {
              "lessThanOrEqual": "22.3.5",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "23.3.6",
              "status": "affected",
              "version": "23.0.0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "24.3.3",
              "status": "affected",
              "version": "24.0.0",
              "versionType": "semver"
            },
            {
              "lessThan": "25.3.0",
              "status": "affected",
              "version": "25.0.0",
              "versionType": "semver"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "value": "Michael Heinzl working with CISA"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\u003cp\u003eOut of bounds read vulnerability due to improper bounds checking in NI LabVIEW in lvre!UDecStrToNum that may result in information disclosure or arbitrary code execution.  Successful exploitation requires an attacker to get a user to open a specially crafted VI.  This vulnerability affects NI LabVIEW 2025 Q1 and prior versions.\u003c/p\u003e"
            }
          ],
          "value": "Out of bounds read vulnerability due to improper bounds checking in NI LabVIEW in lvre!UDecStrToNum that may result in information disclosure or arbitrary code execution.  Successful exploitation requires an attacker to get a user to open a specially crafted VI.  This vulnerability affects NI LabVIEW 2025 Q1 and prior versions."
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-100",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-100 Overflow Buffers"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        },
        {
          "cvssV4_0": {
            "Automatable": "NOT_DEFINED",
            "Recovery": "NOT_DEFINED",
            "Safety": "NOT_DEFINED",
            "attackComplexity": "LOW",
            "attackRequirements": "PRESENT",
            "attackVector": "LOCAL",
            "baseScore": 7.3,
            "baseSeverity": "HIGH",
            "privilegesRequired": "NONE",
            "providerUrgency": "NOT_DEFINED",
            "subAvailabilityImpact": "NONE",
            "subConfidentialityImpact": "NONE",
            "subIntegrityImpact": "NONE",
            "userInteraction": "PASSIVE",
            "valueDensity": "NOT_DEFINED",
            "vectorString": "CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
            "version": "4.0",
            "vulnAvailabilityImpact": "HIGH",
            "vulnConfidentialityImpact": "HIGH",
            "vulnIntegrityImpact": "HIGH",
            "vulnerabilityResponseEffort": "NOT_DEFINED"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-1285",
              "description": "CWE-1285 Improper Validation of Specified Index, Position, or Offset in Input",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-07-23T15:49:06.836Z",
        "orgId": "bca5b2e8-03a4-4781-b4ca-c6a078c0bfd4",
        "shortName": "NI"
      },
      "references": [
        {
          "url": "https://www.ni.com/en/support/security/available-critical-and-security-updates-for-ni-software/out-of-bounds-read-vulnerabilities-in-ni-labview.html"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "title": "Out of Bounds Read Vulnerability in NI LabVIEW when loading fonts",
      "x_generator": {
        "engine": "Vulnogram 0.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "bca5b2e8-03a4-4781-b4ca-c6a078c0bfd4",
    "assignerShortName": "NI",
    "cveId": "CVE-2025-2633",
    "datePublished": "2025-07-23T15:49:06.836Z",
    "dateReserved": "2025-03-21T21:15:17.811Z",
    "dateUpdated": "2025-07-23T17:23:55.255Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2025-2632 (GCVE-0-2025-2632)

Vulnerability from cvelistv5 – Published: 2025-04-09 19:14 – Updated: 2025-04-09 19:32
VLAI?
Summary
Out of bounds write vulnerability due to improper bounds checking in NI LabVIEW reading CPU info from cache that may result in information disclosure or arbitrary code execution. Successful exploitation requires an attacker to get a user to open a specially crafted VI. This vulnerability affects NI LabVIEW 2025 Q1 and prior versions.
CWE
Assigner
NI
Impacted products
Vendor Product Version
NI LabVIEW Affected: 0 , < 22.3.4 (semver)
Affected: 23.1.0 , < 23.3.5 (semver)
Affected: 24.1.0 , < 24.3.2 (semver)
Affected: 25.1.0 , < 25.1.1 (semver)
Create a notification for this product.
Credits
Michael Heinzl working with CISA
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-2632",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-04-09T19:31:48.381410Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-04-09T19:32:06.295Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "platforms": [
            "Windows",
            "MacOS",
            "Linux"
          ],
          "product": "LabVIEW",
          "vendor": "NI",
          "versions": [
            {
              "lessThan": "22.3.4",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            },
            {
              "lessThan": "23.3.5",
              "status": "affected",
              "version": "23.1.0",
              "versionType": "semver"
            },
            {
              "lessThan": "24.3.2",
              "status": "affected",
              "version": "24.1.0",
              "versionType": "semver"
            },
            {
              "lessThan": "25.1.1",
              "status": "affected",
              "version": "25.1.0",
              "versionType": "semver"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "value": "Michael Heinzl working with CISA"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\u003cp\u003eOut of bounds write vulnerability due to improper bounds checking in NI LabVIEW reading CPU info from cache that may result in information disclosure or arbitrary code execution.  Successful exploitation requires an attacker to get a user to open a specially crafted VI.  This vulnerability affects NI LabVIEW 2025 Q1 and prior versions.\u003c/p\u003e"
            }
          ],
          "value": "Out of bounds write vulnerability due to improper bounds checking in NI LabVIEW reading CPU info from cache that may result in information disclosure or arbitrary code execution.  Successful exploitation requires an attacker to get a user to open a specially crafted VI.  This vulnerability affects NI LabVIEW 2025 Q1 and prior versions."
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-100",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-100 Overflow Buffers"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV4_0": {
            "Automatable": "NOT_DEFINED",
            "Recovery": "NOT_DEFINED",
            "Safety": "NOT_DEFINED",
            "attackComplexity": "LOW",
            "attackRequirements": "NONE",
            "attackVector": "LOCAL",
            "baseScore": 8.5,
            "baseSeverity": "HIGH",
            "privilegesRequired": "NONE",
            "providerUrgency": "NOT_DEFINED",
            "subAvailabilityImpact": "NONE",
            "subConfidentialityImpact": "NONE",
            "subIntegrityImpact": "NONE",
            "userInteraction": "PASSIVE",
            "valueDensity": "NOT_DEFINED",
            "vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
            "version": "4.0",
            "vulnAvailabilityImpact": "HIGH",
            "vulnConfidentialityImpact": "HIGH",
            "vulnIntegrityImpact": "HIGH",
            "vulnerabilityResponseEffort": "NOT_DEFINED"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        },
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-787",
              "description": "CWE-787 Out-of-bounds Write",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-04-09T19:14:00.977Z",
        "orgId": "bca5b2e8-03a4-4781-b4ca-c6a078c0bfd4",
        "shortName": "NI"
      },
      "references": [
        {
          "url": "https://www.ni.com/en/support/security/available-critical-and-security-updates-for-ni-software/out-of-bounds-write-vulnerabilities-in-ni-labview.html"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "title": "Out of Bounds Write Vulnerability in NI LabVIEW reading CPU info from cache",
      "x_generator": {
        "engine": "Vulnogram 0.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "bca5b2e8-03a4-4781-b4ca-c6a078c0bfd4",
    "assignerShortName": "NI",
    "cveId": "CVE-2025-2632",
    "datePublished": "2025-04-09T19:14:00.977Z",
    "dateReserved": "2025-03-21T21:12:47.036Z",
    "dateUpdated": "2025-04-09T19:32:06.295Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2025-2631 (GCVE-0-2025-2631)

Vulnerability from cvelistv5 – Published: 2025-04-09 19:10 – Updated: 2025-04-09 19:32
VLAI?
Summary
Out of bounds write vulnerability due to improper bounds checking in NI LabVIEW in InitCPUInformation() that may result in information disclosure or arbitrary code execution. Successful exploitation requires an attacker to get a user to open a specially crafted VI. This vulnerability affects NI LabVIEW 2025 Q1 and prior versions.
CWE
Assigner
NI
Impacted products
Vendor Product Version
NI LabVIEW Affected: 0 , < 22.3.4 (semver)
Affected: 23.1.0 , < 23.3.5 (semver)
Affected: 24.1.0 , < 24.3.2 (semver)
Affected: 25.1.0 , < 25.1.1 (semver)
Create a notification for this product.
Credits
Michael Heinzl working with CISA
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-2631",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-04-09T19:32:31.686691Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-04-09T19:32:46.740Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "platforms": [
            "Windows",
            "MacOS",
            "Linux"
          ],
          "product": "LabVIEW",
          "vendor": "NI",
          "versions": [
            {
              "lessThan": "22.3.4",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            },
            {
              "lessThan": "23.3.5",
              "status": "affected",
              "version": "23.1.0",
              "versionType": "semver"
            },
            {
              "lessThan": "24.3.2",
              "status": "affected",
              "version": "24.1.0",
              "versionType": "semver"
            },
            {
              "lessThan": "25.1.1",
              "status": "affected",
              "version": "25.1.0",
              "versionType": "semver"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "value": "Michael Heinzl working with CISA"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\u003cp\u003eOut of bounds write vulnerability due to improper bounds checking in NI LabVIEW in InitCPUInformation() that may result in information disclosure or arbitrary code execution.  Successful exploitation requires an attacker to get a user to open a specially crafted VI.  This vulnerability affects NI LabVIEW 2025 Q1 and prior versions.\u003c/p\u003e"
            }
          ],
          "value": "Out of bounds write vulnerability due to improper bounds checking in NI LabVIEW in InitCPUInformation() that may result in information disclosure or arbitrary code execution.  Successful exploitation requires an attacker to get a user to open a specially crafted VI.  This vulnerability affects NI LabVIEW 2025 Q1 and prior versions."
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-100",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-100 Overflow Buffers"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        },
        {
          "cvssV4_0": {
            "Automatable": "NOT_DEFINED",
            "Recovery": "NOT_DEFINED",
            "Safety": "NOT_DEFINED",
            "attackComplexity": "LOW",
            "attackRequirements": "NONE",
            "attackVector": "LOCAL",
            "baseScore": 8.5,
            "baseSeverity": "HIGH",
            "privilegesRequired": "NONE",
            "providerUrgency": "NOT_DEFINED",
            "subAvailabilityImpact": "NONE",
            "subConfidentialityImpact": "NONE",
            "subIntegrityImpact": "NONE",
            "userInteraction": "PASSIVE",
            "valueDensity": "NOT_DEFINED",
            "vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
            "version": "4.0",
            "vulnAvailabilityImpact": "HIGH",
            "vulnConfidentialityImpact": "HIGH",
            "vulnIntegrityImpact": "HIGH",
            "vulnerabilityResponseEffort": "NOT_DEFINED"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-787",
              "description": "CWE-787 Out-of-bounds Write",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-04-09T19:10:22.077Z",
        "orgId": "bca5b2e8-03a4-4781-b4ca-c6a078c0bfd4",
        "shortName": "NI"
      },
      "references": [
        {
          "url": "https://www.ni.com/en/support/security/available-critical-and-security-updates-for-ni-software/out-of-bounds-write-vulnerabilities-in-ni-labview.html"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "title": "Out of Bounds Write Vulnerability in NI LabVIEW in InitCPUInformation()",
      "x_generator": {
        "engine": "Vulnogram 0.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "bca5b2e8-03a4-4781-b4ca-c6a078c0bfd4",
    "assignerShortName": "NI",
    "cveId": "CVE-2025-2631",
    "datePublished": "2025-04-09T19:10:22.077Z",
    "dateReserved": "2025-03-21T21:12:45.558Z",
    "dateUpdated": "2025-04-09T19:32:46.740Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2025-2630 (GCVE-0-2025-2630)

Vulnerability from cvelistv5 – Published: 2025-04-09 18:50 – Updated: 2025-04-09 18:57
VLAI?
Summary
There is a DLL hijacking vulnerability due to an uncontrolled search path that exists in NI LabVIEW. This vulnerability may result in arbitrary code execution. Successful exploitation requires an attacker to insert a malicious DLL into the uncontrolled search path. This vulnerability affects NI LabVIEW 2025 Q1 and prior versions.
CWE
  • CWE-427 - Uncontrolled Search Path Element
Assigner
NI
Impacted products
Vendor Product Version
NI LabVIEW Affected: 0 , < 22.3.4 (semver)
Affected: 23.1.0 , < 23.3.5 (semver)
Affected: 24.1.0 , < 224.3.2 (semver)
Affected: 25.1.0 , < 25.1.1 (semver)
Create a notification for this product.
Credits
Mike Palafox from BLOOMY®
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-2630",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-04-09T18:57:32.231305Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-04-09T18:57:44.369Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "platforms": [
            "Windows"
          ],
          "product": "LabVIEW",
          "vendor": "NI",
          "versions": [
            {
              "lessThan": "22.3.4",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            },
            {
              "lessThan": "23.3.5",
              "status": "affected",
              "version": "23.1.0",
              "versionType": "semver"
            },
            {
              "lessThan": "224.3.2",
              "status": "affected",
              "version": "24.1.0",
              "versionType": "semver"
            },
            {
              "lessThan": "25.1.1",
              "status": "affected",
              "version": "25.1.0",
              "versionType": "semver"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "value": "Mike Palafox from BLOOMY\u00ae"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eThere is a DLL hijacking vulnerability due to an uncontrolled search path that exists in NI LabVIEW.  This vulnerability may result in arbitrary code execution.  Successful exploitation requires an attacker to insert a malicious DLL into the uncontrolled search path.  This vulnerability affects NI LabVIEW 2025 Q1 and prior versions.\u003c/span\u003e\u003cbr\u003e"
            }
          ],
          "value": "There is a DLL hijacking vulnerability due to an uncontrolled search path that exists in NI LabVIEW.  This vulnerability may result in arbitrary code execution.  Successful exploitation requires an attacker to insert a malicious DLL into the uncontrolled search path.  This vulnerability affects NI LabVIEW 2025 Q1 and prior versions."
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-471",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-471 Search Order Hijacking"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV4_0": {
            "Automatable": "NOT_DEFINED",
            "Recovery": "NOT_DEFINED",
            "Safety": "NOT_DEFINED",
            "attackComplexity": "LOW",
            "attackRequirements": "NONE",
            "attackVector": "LOCAL",
            "baseScore": 7,
            "baseSeverity": "HIGH",
            "privilegesRequired": "LOW",
            "providerUrgency": "NOT_DEFINED",
            "subAvailabilityImpact": "NONE",
            "subConfidentialityImpact": "NONE",
            "subIntegrityImpact": "NONE",
            "userInteraction": "PASSIVE",
            "valueDensity": "NOT_DEFINED",
            "vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
            "version": "4.0",
            "vulnAvailabilityImpact": "HIGH",
            "vulnConfidentialityImpact": "HIGH",
            "vulnIntegrityImpact": "HIGH",
            "vulnerabilityResponseEffort": "NOT_DEFINED"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        },
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.3,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-427",
              "description": "CWE-427 Uncontrolled Search Path Element",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-04-09T18:50:05.849Z",
        "orgId": "bca5b2e8-03a4-4781-b4ca-c6a078c0bfd4",
        "shortName": "NI"
      },
      "references": [
        {
          "url": "https://www.ni.com/en/support/security/available-critical-and-security-updates-for-ni-software/dll-hijacking-vulnerability-in-ni-labview.html"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "title": "DLL Hijacking Vulnerability in NI LabVIEW",
      "x_generator": {
        "engine": "Vulnogram 0.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "bca5b2e8-03a4-4781-b4ca-c6a078c0bfd4",
    "assignerShortName": "NI",
    "cveId": "CVE-2025-2630",
    "datePublished": "2025-04-09T18:50:05.849Z",
    "dateReserved": "2025-03-21T21:07:31.428Z",
    "dateUpdated": "2025-04-09T18:57:44.369Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2025-2629 (GCVE-0-2025-2629)

Vulnerability from cvelistv5 – Published: 2025-04-09 18:45 – Updated: 2025-04-09 18:58
VLAI?
Summary
There is a DLL hijacking vulnerability due to an uncontrolled search path that exists in NI LabVIEW when loading NI Error Reporting. This vulnerability may result in arbitrary code execution. Successful exploitation requires an attacker to insert a malicious DLL into the uncontrolled search path. This vulnerability affects NI LabVIEW 2025 Q1 and prior versions.
CWE
  • CWE-427 - Uncontrolled Search Path Element
Assigner
NI
Impacted products
Vendor Product Version
NI LabVIEW Affected: 0 , < 22.3.4 (semver)
Affected: 23.1.0 , < 223.3.5 (semver)
Affected: 24.1.0 , < 24.3.2 (sem)
Affected: 25.1.0 , < 25.1.1 (semver)
Create a notification for this product.
Credits
Mike Palafox from BLOOMY®
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-2629",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-04-09T18:58:34.817569Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-04-09T18:58:49.944Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "platforms": [
            "Windows"
          ],
          "product": "LabVIEW",
          "vendor": "NI",
          "versions": [
            {
              "lessThan": "22.3.4",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            },
            {
              "lessThan": "223.3.5",
              "status": "affected",
              "version": "23.1.0",
              "versionType": "semver"
            },
            {
              "lessThan": "24.3.2",
              "status": "affected",
              "version": "24.1.0",
              "versionType": "sem"
            },
            {
              "lessThan": "25.1.1",
              "status": "affected",
              "version": "25.1.0",
              "versionType": "semver"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "value": "Mike Palafox from BLOOMY\u00ae"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eThere is a DLL hijacking vulnerability due to an uncontrolled search path that exists in NI LabVIEW when loading NI Error Reporting.  This vulnerability may result in arbitrary code execution.  Successful exploitation requires an attacker to insert a malicious DLL into the uncontrolled search path.  This vulnerability affects NI LabVIEW 2025 Q1 and prior versions.\u003c/span\u003e\u003cbr\u003e"
            }
          ],
          "value": "There is a DLL hijacking vulnerability due to an uncontrolled search path that exists in NI LabVIEW when loading NI Error Reporting.  This vulnerability may result in arbitrary code execution.  Successful exploitation requires an attacker to insert a malicious DLL into the uncontrolled search path.  This vulnerability affects NI LabVIEW 2025 Q1 and prior versions."
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-471",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-471 Search Order Hijacking"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV4_0": {
            "Automatable": "NOT_DEFINED",
            "Recovery": "NOT_DEFINED",
            "Safety": "NOT_DEFINED",
            "attackComplexity": "LOW",
            "attackRequirements": "NONE",
            "attackVector": "LOCAL",
            "baseScore": 7,
            "baseSeverity": "HIGH",
            "privilegesRequired": "LOW",
            "providerUrgency": "NOT_DEFINED",
            "subAvailabilityImpact": "NONE",
            "subConfidentialityImpact": "NONE",
            "subIntegrityImpact": "NONE",
            "userInteraction": "PASSIVE",
            "valueDensity": "NOT_DEFINED",
            "vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
            "version": "4.0",
            "vulnAvailabilityImpact": "HIGH",
            "vulnConfidentialityImpact": "HIGH",
            "vulnIntegrityImpact": "HIGH",
            "vulnerabilityResponseEffort": "NOT_DEFINED"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        },
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.3,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-427",
              "description": "CWE-427 Uncontrolled Search Path Element",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-04-09T18:45:35.434Z",
        "orgId": "bca5b2e8-03a4-4781-b4ca-c6a078c0bfd4",
        "shortName": "NI"
      },
      "references": [
        {
          "url": "https://www.ni.com/en/support/security/available-critical-and-security-updates-for-ni-software/dll-hijacking-vulnerability-in-ni-labview-when-loading-ni-error-reporting.html"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "title": "DLL Hijacking Vulnerability in NI LabVIEW When Loading NI Error Reporting",
      "x_generator": {
        "engine": "Vulnogram 0.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "bca5b2e8-03a4-4781-b4ca-c6a078c0bfd4",
    "assignerShortName": "NI",
    "cveId": "CVE-2025-2629",
    "datePublished": "2025-04-09T18:45:35.434Z",
    "dateReserved": "2025-03-21T21:07:28.841Z",
    "dateUpdated": "2025-04-09T18:58:49.944Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2025-12097 (GCVE-0-2025-12097)

Vulnerability from nvd – Published: 2025-12-04 19:07 – Updated: 2025-12-08 20:50
VLAI?
Summary
There is a relative path traversal vulnerability in the NI System Web Server that may result in information disclosure.  Successful exploitation requires an attacker to send a specially crafted request to the NI System Web Server, allowing the attacker to read arbitrary files.  This vulnerability existed in the NI System Web Server 2012 and prior versions.  It was fixed in 2013.
CWE
  • CWE-23 - Relative Path Traversal
Assigner
NI
Impacted products
Vendor Product Version
NI LabVIEW Affected: 9.0.0 , ≤ 12.* (semver)
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-12097",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-12-08T20:50:14.740806Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-12-08T20:50:23.849Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "LabVIEW",
          "vendor": "NI",
          "versions": [
            {
              "lessThanOrEqual": "12.*",
              "status": "affected",
              "version": "9.0.0",
              "versionType": "semver"
            }
          ]
        }
      ],
      "cpeApplicability": [
        {
          "nodes": [
            {
              "cpeMatch": [
                {
                  "criteria": "cpe:2.3:a:ni:labview:*:*:*:*:*:*:*:*",
                  "versionEndIncluding": "12.*",
                  "versionStartIncluding": "9.0.0",
                  "vulnerable": true
                }
              ],
              "negate": false,
              "operator": "OR"
            }
          ],
          "operator": "OR"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eThere is a relative path traversal vulnerability in the NI System Web Server that may result in information disclosure. \u0026nbsp;Successful exploitation requires an attacker to send a specially crafted request to the NI System Web Server, allowing the attacker to read arbitrary files. \u0026nbsp;This vulnerability existed in the NI System Web Server 2012 and prior versions. \u0026nbsp;It was fixed in 2013. \u003c/span\u003e\u003cbr\u003e"
            }
          ],
          "value": "There is a relative path traversal vulnerability in the NI System Web Server that may result in information disclosure. \u00a0Successful exploitation requires an attacker to send a specially crafted request to the NI System Web Server, allowing the attacker to read arbitrary files. \u00a0This vulnerability existed in the NI System Web Server 2012 and prior versions. \u00a0It was fixed in 2013."
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-139",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-139 Relative Path Traversal"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        },
        {
          "cvssV4_0": {
            "Automatable": "NOT_DEFINED",
            "Recovery": "NOT_DEFINED",
            "Safety": "NOT_DEFINED",
            "attackComplexity": "LOW",
            "attackRequirements": "NONE",
            "attackVector": "NETWORK",
            "baseScore": 8.7,
            "baseSeverity": "HIGH",
            "exploitMaturity": "NOT_DEFINED",
            "privilegesRequired": "NONE",
            "providerUrgency": "NOT_DEFINED",
            "subAvailabilityImpact": "NONE",
            "subConfidentialityImpact": "NONE",
            "subIntegrityImpact": "NONE",
            "userInteraction": "NONE",
            "valueDensity": "NOT_DEFINED",
            "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N",
            "version": "4.0",
            "vulnAvailabilityImpact": "NONE",
            "vulnConfidentialityImpact": "HIGH",
            "vulnIntegrityImpact": "NONE",
            "vulnerabilityResponseEffort": "NOT_DEFINED"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-23",
              "description": "CWE-23- Relative Path Traversal",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-12-04T19:07:46.813Z",
        "orgId": "bca5b2e8-03a4-4781-b4ca-c6a078c0bfd4",
        "shortName": "NI"
      },
      "references": [
        {
          "url": "https://www.ni.com/en/support/security/available-critical-and-security-updates-for-ni-software/relative-path-traversal-vulnerability-in-ni-system-web-server.html"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "x_generator": {
        "engine": "Vulnogram 0.5.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "bca5b2e8-03a4-4781-b4ca-c6a078c0bfd4",
    "assignerShortName": "NI",
    "cveId": "CVE-2025-12097",
    "datePublished": "2025-12-04T19:07:46.813Z",
    "dateReserved": "2025-10-22T21:08:54.165Z",
    "dateUpdated": "2025-12-08T20:50:23.849Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2"
}

CVE-2025-7849 (GCVE-0-2025-7849)

Vulnerability from nvd – Published: 2025-07-29 21:27 – Updated: 2025-08-02 03:55
VLAI?
Summary
A memory corruption vulnerability due to improper error handling when a VILinkObj is null exists in NI LabVIEW that may result in arbitrary code execution. Successful exploitation requires an attacker to get a user to open a specially crafted VI. This vulnerability affects NI LabVIEW 2025 Q1 and prior versions.
CWE
Assigner
NI
Impacted products
Vendor Product Version
NI LabVIEW Affected: 0 , ≤ 22.3.5 (semver)
Affected: 23.0.0 , ≤ 23.3.6 (semver)
Affected: 24.0.0 , ≤ 24.3.3 (semver)
Affected: 25.0.0 , < 25.3.0 (semver)
Create a notification for this product.
Credits
Rocco Calvi (@TecR0c) with TecSecurity working with Trend Micro Zero Day Initiative
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-7849",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-08-01T00:00:00+00:00",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-08-02T03:55:48.802Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "LabVIEW",
          "vendor": "NI",
          "versions": [
            {
              "lessThanOrEqual": "22.3.5",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "23.3.6",
              "status": "affected",
              "version": "23.0.0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "24.3.3",
              "status": "affected",
              "version": "24.0.0",
              "versionType": "semver"
            },
            {
              "lessThan": "25.3.0",
              "status": "affected",
              "version": "25.0.0",
              "versionType": "semver"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "value": "Rocco Calvi (@TecR0c) with TecSecurity working with Trend Micro Zero Day Initiative"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\u003cp\u003eA memory corruption vulnerability due to improper error handling when a VILinkObj is null exists in NI LabVIEW that may result in arbitrary code execution.  Successful exploitation requires an attacker to get a user to open a specially crafted VI.  This vulnerability affects NI LabVIEW 2025 Q1 and prior versions.\u003c/p\u003e"
            }
          ],
          "value": "A memory corruption vulnerability due to improper error handling when a VILinkObj is null exists in NI LabVIEW that may result in arbitrary code execution.  Successful exploitation requires an attacker to get a user to open a specially crafted VI.  This vulnerability affects NI LabVIEW 2025 Q1 and prior versions."
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-23",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-23 File Content Injection"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        },
        {
          "cvssV4_0": {
            "Automatable": "NOT_DEFINED",
            "Recovery": "NOT_DEFINED",
            "Safety": "NOT_DEFINED",
            "attackComplexity": "LOW",
            "attackRequirements": "NONE",
            "attackVector": "LOCAL",
            "baseScore": 8.5,
            "baseSeverity": "HIGH",
            "privilegesRequired": "NONE",
            "providerUrgency": "NOT_DEFINED",
            "subAvailabilityImpact": "NONE",
            "subConfidentialityImpact": "NONE",
            "subIntegrityImpact": "NONE",
            "userInteraction": "PASSIVE",
            "valueDensity": "NOT_DEFINED",
            "vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
            "version": "4.0",
            "vulnAvailabilityImpact": "HIGH",
            "vulnConfidentialityImpact": "HIGH",
            "vulnIntegrityImpact": "HIGH",
            "vulnerabilityResponseEffort": "NOT_DEFINED"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-1285",
              "description": "CWE-1285",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-07-29T21:27:20.080Z",
        "orgId": "bca5b2e8-03a4-4781-b4ca-c6a078c0bfd4",
        "shortName": "NI"
      },
      "references": [
        {
          "url": "https://www.ni.com/en/support/security/available-critical-and-security-updates-for-ni-software/memory-corruption-vulnerabilities-in-ni-labview.html"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "title": "Memory Corruption Issue in NI LabVIEW due to improper error handling",
      "x_generator": {
        "engine": "Vulnogram 0.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "bca5b2e8-03a4-4781-b4ca-c6a078c0bfd4",
    "assignerShortName": "NI",
    "cveId": "CVE-2025-7849",
    "datePublished": "2025-07-29T21:27:20.080Z",
    "dateReserved": "2025-07-18T21:43:09.001Z",
    "dateUpdated": "2025-08-02T03:55:48.802Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2025-7848 (GCVE-0-2025-7848)

Vulnerability from nvd – Published: 2025-07-29 21:24 – Updated: 2025-08-02 03:55
VLAI?
Summary
A memory corruption vulnerability due to improper input validation in lvpict.cpp exists in NI LabVIEW that may result in arbitrary code execution. Successful exploitation requires an attacker to get a user to open a specially crafted VI. This vulnerability affects NI LabVIEW 2025 Q1 and prior versions.
CWE
  • CWE-1285 - Improper Validation of Specified Index, Position, or Offset in Input
Assigner
NI
Impacted products
Vendor Product Version
NI LabVIEW Affected: 0 , ≤ 22.3.5 (semver)
Affected: 23.0.0 , ≤ 23.3.6 (semver)
Affected: 24.0.0 , ≤ 24.3.3 (semver)
Affected: 25.0.0 , < 25.3.0 (semver)
Create a notification for this product.
Credits
Rocco Calvi (@TecR0c) with TecSecurity working with Trend Micro Zero Day Initiative
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-7848",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-08-01T00:00:00+00:00",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-08-02T03:55:47.625Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "LabVIEW",
          "vendor": "NI",
          "versions": [
            {
              "lessThanOrEqual": "22.3.5",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "23.3.6",
              "status": "affected",
              "version": "23.0.0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "24.3.3",
              "status": "affected",
              "version": "24.0.0",
              "versionType": "semver"
            },
            {
              "lessThan": "25.3.0",
              "status": "affected",
              "version": "25.0.0",
              "versionType": "semver"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "value": "Rocco Calvi (@TecR0c) with TecSecurity working with Trend Micro Zero Day Initiative"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\u003cp\u003eA memory corruption vulnerability due to improper input validation in lvpict.cpp exists in NI LabVIEW that may result in arbitrary code execution.  Successful exploitation requires an attacker to get a user to open a specially crafted VI.  This vulnerability affects NI LabVIEW 2025 Q1 and prior versions.\u003c/p\u003e"
            }
          ],
          "value": "A memory corruption vulnerability due to improper input validation in lvpict.cpp exists in NI LabVIEW that may result in arbitrary code execution.  Successful exploitation requires an attacker to get a user to open a specially crafted VI.  This vulnerability affects NI LabVIEW 2025 Q1 and prior versions."
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-23",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-23 File Content Injection"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        },
        {
          "cvssV4_0": {
            "Automatable": "NOT_DEFINED",
            "Recovery": "NOT_DEFINED",
            "Safety": "NOT_DEFINED",
            "attackComplexity": "LOW",
            "attackRequirements": "NONE",
            "attackVector": "LOCAL",
            "baseScore": 8.5,
            "baseSeverity": "HIGH",
            "privilegesRequired": "NONE",
            "providerUrgency": "NOT_DEFINED",
            "subAvailabilityImpact": "NONE",
            "subConfidentialityImpact": "NONE",
            "subIntegrityImpact": "NONE",
            "userInteraction": "PASSIVE",
            "valueDensity": "NOT_DEFINED",
            "vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
            "version": "4.0",
            "vulnAvailabilityImpact": "HIGH",
            "vulnConfidentialityImpact": "HIGH",
            "vulnIntegrityImpact": "HIGH",
            "vulnerabilityResponseEffort": "NOT_DEFINED"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-1285",
              "description": "CWE-1285 Improper Validation of Specified Index, Position, or Offset in Input",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-07-29T21:24:32.568Z",
        "orgId": "bca5b2e8-03a4-4781-b4ca-c6a078c0bfd4",
        "shortName": "NI"
      },
      "references": [
        {
          "url": "https://www.ni.com/en/support/security/available-critical-and-security-updates-for-ni-software/memory-corruption-vulnerabilities-in-ni-labview.html"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "title": "Missing input check in lvpict.cpp used in NI LabVIEW",
      "x_generator": {
        "engine": "Vulnogram 0.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "bca5b2e8-03a4-4781-b4ca-c6a078c0bfd4",
    "assignerShortName": "NI",
    "cveId": "CVE-2025-7848",
    "datePublished": "2025-07-29T21:24:32.568Z",
    "dateReserved": "2025-07-18T21:43:07.604Z",
    "dateUpdated": "2025-08-02T03:55:47.625Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2025-7361 (GCVE-0-2025-7361)

Vulnerability from nvd – Published: 2025-07-29 21:19 – Updated: 2025-08-02 03:55
VLAI?
Summary
A code injection vulnerability due to an improper initialization check exists in NI LabVIEW that may result in arbitrary code execution. Successful exploitation requires an attacker to get a user to open a specially crafted VI using a CIN node. This vulnerability affects 32-bit NI LabVIEW 2025 Q1 and prior versions. LabVIEW 64-bit versions do not support CIN nodes and are not affected.
CWE
  • CWE-94 - Improper Control of Generation of Code ('Code Injection')
Assigner
NI
Impacted products
Vendor Product Version
NI LabVIEW Affected: 0 , ≤ 22.3.5 (semver)
Affected: 23.0.0 , ≤ 23.3.6 (semver)
Affected: 24.0.0 , ≤ 24.3.3 (semver)
Affected: 25.0.0 , < 25.3.0 (semver)
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-7361",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-08-01T00:00:00+00:00",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-08-02T03:55:46.530Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "platforms": [
            "Windows",
            "32 bit"
          ],
          "product": "LabVIEW",
          "vendor": "NI",
          "versions": [
            {
              "lessThanOrEqual": "22.3.5",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "23.3.6",
              "status": "affected",
              "version": "23.0.0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "24.3.3",
              "status": "affected",
              "version": "24.0.0",
              "versionType": "semver"
            },
            {
              "lessThan": "25.3.0",
              "status": "affected",
              "version": "25.0.0",
              "versionType": "semver"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\u003cp\u003eA code injection vulnerability due to an improper initialization check exists in NI LabVIEW that may result in arbitrary code execution.  Successful exploitation requires an attacker to get a user to open a specially crafted VI using a CIN node.  This vulnerability affects 32-bit NI LabVIEW 2025 Q1 and prior versions.  LabVIEW 64-bit versions do not support CIN nodes and are not affected.\u003c/p\u003e"
            }
          ],
          "value": "A code injection vulnerability due to an improper initialization check exists in NI LabVIEW that may result in arbitrary code execution.  Successful exploitation requires an attacker to get a user to open a specially crafted VI using a CIN node.  This vulnerability affects 32-bit NI LabVIEW 2025 Q1 and prior versions.  LabVIEW 64-bit versions do not support CIN nodes and are not affected."
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-242",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-242 Code Injection"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        },
        {
          "cvssV4_0": {
            "Automatable": "NOT_DEFINED",
            "Recovery": "NOT_DEFINED",
            "Safety": "NOT_DEFINED",
            "attackComplexity": "LOW",
            "attackRequirements": "NONE",
            "attackVector": "LOCAL",
            "baseScore": 8.5,
            "baseSeverity": "HIGH",
            "privilegesRequired": "NONE",
            "providerUrgency": "NOT_DEFINED",
            "subAvailabilityImpact": "NONE",
            "subConfidentialityImpact": "NONE",
            "subIntegrityImpact": "NONE",
            "userInteraction": "PASSIVE",
            "valueDensity": "NOT_DEFINED",
            "vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
            "version": "4.0",
            "vulnAvailabilityImpact": "HIGH",
            "vulnConfidentialityImpact": "HIGH",
            "vulnIntegrityImpact": "HIGH",
            "vulnerabilityResponseEffort": "NOT_DEFINED"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-94",
              "description": "CWE-94 Improper Control of Generation of Code (\u0027Code Injection\u0027)",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-07-29T21:19:28.118Z",
        "orgId": "bca5b2e8-03a4-4781-b4ca-c6a078c0bfd4",
        "shortName": "NI"
      },
      "references": [
        {
          "url": "https://www.ni.com/en/support/security/available-critical-and-security-updates-for-ni-software/code-injection-vulnerability-in-ni-labview-using-cin-nodes.html"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "title": "Code Injection Vulnerability in NI LabVIEW when using CIN nodes",
      "x_generator": {
        "engine": "Vulnogram 0.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "bca5b2e8-03a4-4781-b4ca-c6a078c0bfd4",
    "assignerShortName": "NI",
    "cveId": "CVE-2025-7361",
    "datePublished": "2025-07-29T21:19:28.118Z",
    "dateReserved": "2025-07-08T16:56:14.380Z",
    "dateUpdated": "2025-08-02T03:55:46.530Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2025-2634 (GCVE-0-2025-2634)

Vulnerability from nvd – Published: 2025-07-23 15:53 – Updated: 2025-07-23 20:10
VLAI?
Summary
Out of bounds read vulnerability due to improper bounds checking in NI LabVIEW in fontmgr may result in information disclosure or arbitrary code execution. Successful exploitation requires an attacker to get a user to open a specially crafted VI. This vulnerability affects NI LabVIEW 2025 Q1 and prior versions.
CWE
  • CWE-1285 - Improper Validation of Specified Index, Position, or Offset in Input
Assigner
NI
Impacted products
Vendor Product Version
NI LabVIEW Affected: 0 , ≤ 22.3.5 (sem)
Affected: 23.0.0 , ≤ 23.3.6 (semver)
Affected: 24.0.0 , ≤ 24.3.3 (semver)
Affected: 25.0.0 , < 25.3.0 (semver)
Create a notification for this product.
Credits
Michael Heinzl working with CISA
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-2634",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-07-23T20:09:47.785454Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-07-23T20:10:00.301Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "platforms": [
            "Windows",
            "Linux"
          ],
          "product": "LabVIEW",
          "vendor": "NI",
          "versions": [
            {
              "lessThanOrEqual": "22.3.5",
              "status": "affected",
              "version": "0",
              "versionType": "sem"
            },
            {
              "lessThanOrEqual": "23.3.6",
              "status": "affected",
              "version": "23.0.0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "24.3.3",
              "status": "affected",
              "version": "24.0.0",
              "versionType": "semver"
            },
            {
              "lessThan": "25.3.0",
              "status": "affected",
              "version": "25.0.0",
              "versionType": "semver"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "value": "Michael Heinzl working with CISA"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\u003cp\u003eOut of bounds read vulnerability due to improper bounds checking in NI LabVIEW in fontmgr may result in information disclosure or arbitrary code execution.  Successful exploitation requires an attacker to get a user to open a specially crafted VI.  This vulnerability affects NI LabVIEW 2025 Q1 and prior versions.\u003c/p\u003e"
            }
          ],
          "value": "Out of bounds read vulnerability due to improper bounds checking in NI LabVIEW in fontmgr may result in information disclosure or arbitrary code execution.  Successful exploitation requires an attacker to get a user to open a specially crafted VI.  This vulnerability affects NI LabVIEW 2025 Q1 and prior versions."
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-100",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-100 Overflow Buffers"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        },
        {
          "cvssV4_0": {
            "Automatable": "NOT_DEFINED",
            "Recovery": "NOT_DEFINED",
            "Safety": "NOT_DEFINED",
            "attackComplexity": "LOW",
            "attackRequirements": "PRESENT",
            "attackVector": "LOCAL",
            "baseScore": 7.3,
            "baseSeverity": "HIGH",
            "privilegesRequired": "NONE",
            "providerUrgency": "NOT_DEFINED",
            "subAvailabilityImpact": "NONE",
            "subConfidentialityImpact": "NONE",
            "subIntegrityImpact": "NONE",
            "userInteraction": "PASSIVE",
            "valueDensity": "NOT_DEFINED",
            "vectorString": "CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
            "version": "4.0",
            "vulnAvailabilityImpact": "HIGH",
            "vulnConfidentialityImpact": "HIGH",
            "vulnIntegrityImpact": "HIGH",
            "vulnerabilityResponseEffort": "NOT_DEFINED"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-1285",
              "description": "CWE-1285 Improper Validation of Specified Index, Position, or Offset in Input",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-07-23T15:53:25.130Z",
        "orgId": "bca5b2e8-03a4-4781-b4ca-c6a078c0bfd4",
        "shortName": "NI"
      },
      "references": [
        {
          "url": "https://www.ni.com/en/support/security/available-critical-and-security-updates-for-ni-software/out-of-bounds-read-vulnerabilities-in-ni-labview.html"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "title": "Out of Bounds Read Vulnerability in NI LabVIEW when building font map",
      "x_generator": {
        "engine": "Vulnogram 0.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "bca5b2e8-03a4-4781-b4ca-c6a078c0bfd4",
    "assignerShortName": "NI",
    "cveId": "CVE-2025-2634",
    "datePublished": "2025-07-23T15:53:25.130Z",
    "dateReserved": "2025-03-21T21:15:19.488Z",
    "dateUpdated": "2025-07-23T20:10:00.301Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2025-2633 (GCVE-0-2025-2633)

Vulnerability from nvd – Published: 2025-07-23 15:49 – Updated: 2025-07-23 17:23
VLAI?
Summary
Out of bounds read vulnerability due to improper bounds checking in NI LabVIEW in lvre!UDecStrToNum that may result in information disclosure or arbitrary code execution. Successful exploitation requires an attacker to get a user to open a specially crafted VI. This vulnerability affects NI LabVIEW 2025 Q1 and prior versions.
CWE
  • CWE-1285 - Improper Validation of Specified Index, Position, or Offset in Input
Assigner
NI
Impacted products
Vendor Product Version
NI LabVIEW Affected: 0 , ≤ 22.3.5 (semver)
Affected: 23.0.0 , ≤ 23.3.6 (semver)
Affected: 24.0.0 , ≤ 24.3.3 (semver)
Affected: 25.0.0 , < 25.3.0 (semver)
Create a notification for this product.
Credits
Michael Heinzl working with CISA
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-2633",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-07-23T17:23:47.897012Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-07-23T17:23:55.255Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "platforms": [
            "Windows",
            "Linux"
          ],
          "product": "LabVIEW",
          "vendor": "NI",
          "versions": [
            {
              "lessThanOrEqual": "22.3.5",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "23.3.6",
              "status": "affected",
              "version": "23.0.0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "24.3.3",
              "status": "affected",
              "version": "24.0.0",
              "versionType": "semver"
            },
            {
              "lessThan": "25.3.0",
              "status": "affected",
              "version": "25.0.0",
              "versionType": "semver"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "value": "Michael Heinzl working with CISA"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\u003cp\u003eOut of bounds read vulnerability due to improper bounds checking in NI LabVIEW in lvre!UDecStrToNum that may result in information disclosure or arbitrary code execution.  Successful exploitation requires an attacker to get a user to open a specially crafted VI.  This vulnerability affects NI LabVIEW 2025 Q1 and prior versions.\u003c/p\u003e"
            }
          ],
          "value": "Out of bounds read vulnerability due to improper bounds checking in NI LabVIEW in lvre!UDecStrToNum that may result in information disclosure or arbitrary code execution.  Successful exploitation requires an attacker to get a user to open a specially crafted VI.  This vulnerability affects NI LabVIEW 2025 Q1 and prior versions."
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-100",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-100 Overflow Buffers"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        },
        {
          "cvssV4_0": {
            "Automatable": "NOT_DEFINED",
            "Recovery": "NOT_DEFINED",
            "Safety": "NOT_DEFINED",
            "attackComplexity": "LOW",
            "attackRequirements": "PRESENT",
            "attackVector": "LOCAL",
            "baseScore": 7.3,
            "baseSeverity": "HIGH",
            "privilegesRequired": "NONE",
            "providerUrgency": "NOT_DEFINED",
            "subAvailabilityImpact": "NONE",
            "subConfidentialityImpact": "NONE",
            "subIntegrityImpact": "NONE",
            "userInteraction": "PASSIVE",
            "valueDensity": "NOT_DEFINED",
            "vectorString": "CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
            "version": "4.0",
            "vulnAvailabilityImpact": "HIGH",
            "vulnConfidentialityImpact": "HIGH",
            "vulnIntegrityImpact": "HIGH",
            "vulnerabilityResponseEffort": "NOT_DEFINED"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-1285",
              "description": "CWE-1285 Improper Validation of Specified Index, Position, or Offset in Input",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-07-23T15:49:06.836Z",
        "orgId": "bca5b2e8-03a4-4781-b4ca-c6a078c0bfd4",
        "shortName": "NI"
      },
      "references": [
        {
          "url": "https://www.ni.com/en/support/security/available-critical-and-security-updates-for-ni-software/out-of-bounds-read-vulnerabilities-in-ni-labview.html"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "title": "Out of Bounds Read Vulnerability in NI LabVIEW when loading fonts",
      "x_generator": {
        "engine": "Vulnogram 0.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "bca5b2e8-03a4-4781-b4ca-c6a078c0bfd4",
    "assignerShortName": "NI",
    "cveId": "CVE-2025-2633",
    "datePublished": "2025-07-23T15:49:06.836Z",
    "dateReserved": "2025-03-21T21:15:17.811Z",
    "dateUpdated": "2025-07-23T17:23:55.255Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2025-2632 (GCVE-0-2025-2632)

Vulnerability from nvd – Published: 2025-04-09 19:14 – Updated: 2025-04-09 19:32
VLAI?
Summary
Out of bounds write vulnerability due to improper bounds checking in NI LabVIEW reading CPU info from cache that may result in information disclosure or arbitrary code execution. Successful exploitation requires an attacker to get a user to open a specially crafted VI. This vulnerability affects NI LabVIEW 2025 Q1 and prior versions.
CWE
Assigner
NI
Impacted products
Vendor Product Version
NI LabVIEW Affected: 0 , < 22.3.4 (semver)
Affected: 23.1.0 , < 23.3.5 (semver)
Affected: 24.1.0 , < 24.3.2 (semver)
Affected: 25.1.0 , < 25.1.1 (semver)
Create a notification for this product.
Credits
Michael Heinzl working with CISA
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-2632",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-04-09T19:31:48.381410Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-04-09T19:32:06.295Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "platforms": [
            "Windows",
            "MacOS",
            "Linux"
          ],
          "product": "LabVIEW",
          "vendor": "NI",
          "versions": [
            {
              "lessThan": "22.3.4",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            },
            {
              "lessThan": "23.3.5",
              "status": "affected",
              "version": "23.1.0",
              "versionType": "semver"
            },
            {
              "lessThan": "24.3.2",
              "status": "affected",
              "version": "24.1.0",
              "versionType": "semver"
            },
            {
              "lessThan": "25.1.1",
              "status": "affected",
              "version": "25.1.0",
              "versionType": "semver"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "value": "Michael Heinzl working with CISA"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\u003cp\u003eOut of bounds write vulnerability due to improper bounds checking in NI LabVIEW reading CPU info from cache that may result in information disclosure or arbitrary code execution.  Successful exploitation requires an attacker to get a user to open a specially crafted VI.  This vulnerability affects NI LabVIEW 2025 Q1 and prior versions.\u003c/p\u003e"
            }
          ],
          "value": "Out of bounds write vulnerability due to improper bounds checking in NI LabVIEW reading CPU info from cache that may result in information disclosure or arbitrary code execution.  Successful exploitation requires an attacker to get a user to open a specially crafted VI.  This vulnerability affects NI LabVIEW 2025 Q1 and prior versions."
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-100",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-100 Overflow Buffers"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV4_0": {
            "Automatable": "NOT_DEFINED",
            "Recovery": "NOT_DEFINED",
            "Safety": "NOT_DEFINED",
            "attackComplexity": "LOW",
            "attackRequirements": "NONE",
            "attackVector": "LOCAL",
            "baseScore": 8.5,
            "baseSeverity": "HIGH",
            "privilegesRequired": "NONE",
            "providerUrgency": "NOT_DEFINED",
            "subAvailabilityImpact": "NONE",
            "subConfidentialityImpact": "NONE",
            "subIntegrityImpact": "NONE",
            "userInteraction": "PASSIVE",
            "valueDensity": "NOT_DEFINED",
            "vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
            "version": "4.0",
            "vulnAvailabilityImpact": "HIGH",
            "vulnConfidentialityImpact": "HIGH",
            "vulnIntegrityImpact": "HIGH",
            "vulnerabilityResponseEffort": "NOT_DEFINED"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        },
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-787",
              "description": "CWE-787 Out-of-bounds Write",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-04-09T19:14:00.977Z",
        "orgId": "bca5b2e8-03a4-4781-b4ca-c6a078c0bfd4",
        "shortName": "NI"
      },
      "references": [
        {
          "url": "https://www.ni.com/en/support/security/available-critical-and-security-updates-for-ni-software/out-of-bounds-write-vulnerabilities-in-ni-labview.html"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "title": "Out of Bounds Write Vulnerability in NI LabVIEW reading CPU info from cache",
      "x_generator": {
        "engine": "Vulnogram 0.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "bca5b2e8-03a4-4781-b4ca-c6a078c0bfd4",
    "assignerShortName": "NI",
    "cveId": "CVE-2025-2632",
    "datePublished": "2025-04-09T19:14:00.977Z",
    "dateReserved": "2025-03-21T21:12:47.036Z",
    "dateUpdated": "2025-04-09T19:32:06.295Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2025-2631 (GCVE-0-2025-2631)

Vulnerability from nvd – Published: 2025-04-09 19:10 – Updated: 2025-04-09 19:32
VLAI?
Summary
Out of bounds write vulnerability due to improper bounds checking in NI LabVIEW in InitCPUInformation() that may result in information disclosure or arbitrary code execution. Successful exploitation requires an attacker to get a user to open a specially crafted VI. This vulnerability affects NI LabVIEW 2025 Q1 and prior versions.
CWE
Assigner
NI
Impacted products
Vendor Product Version
NI LabVIEW Affected: 0 , < 22.3.4 (semver)
Affected: 23.1.0 , < 23.3.5 (semver)
Affected: 24.1.0 , < 24.3.2 (semver)
Affected: 25.1.0 , < 25.1.1 (semver)
Create a notification for this product.
Credits
Michael Heinzl working with CISA
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-2631",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-04-09T19:32:31.686691Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-04-09T19:32:46.740Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "platforms": [
            "Windows",
            "MacOS",
            "Linux"
          ],
          "product": "LabVIEW",
          "vendor": "NI",
          "versions": [
            {
              "lessThan": "22.3.4",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            },
            {
              "lessThan": "23.3.5",
              "status": "affected",
              "version": "23.1.0",
              "versionType": "semver"
            },
            {
              "lessThan": "24.3.2",
              "status": "affected",
              "version": "24.1.0",
              "versionType": "semver"
            },
            {
              "lessThan": "25.1.1",
              "status": "affected",
              "version": "25.1.0",
              "versionType": "semver"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "value": "Michael Heinzl working with CISA"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\u003cp\u003eOut of bounds write vulnerability due to improper bounds checking in NI LabVIEW in InitCPUInformation() that may result in information disclosure or arbitrary code execution.  Successful exploitation requires an attacker to get a user to open a specially crafted VI.  This vulnerability affects NI LabVIEW 2025 Q1 and prior versions.\u003c/p\u003e"
            }
          ],
          "value": "Out of bounds write vulnerability due to improper bounds checking in NI LabVIEW in InitCPUInformation() that may result in information disclosure or arbitrary code execution.  Successful exploitation requires an attacker to get a user to open a specially crafted VI.  This vulnerability affects NI LabVIEW 2025 Q1 and prior versions."
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-100",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-100 Overflow Buffers"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        },
        {
          "cvssV4_0": {
            "Automatable": "NOT_DEFINED",
            "Recovery": "NOT_DEFINED",
            "Safety": "NOT_DEFINED",
            "attackComplexity": "LOW",
            "attackRequirements": "NONE",
            "attackVector": "LOCAL",
            "baseScore": 8.5,
            "baseSeverity": "HIGH",
            "privilegesRequired": "NONE",
            "providerUrgency": "NOT_DEFINED",
            "subAvailabilityImpact": "NONE",
            "subConfidentialityImpact": "NONE",
            "subIntegrityImpact": "NONE",
            "userInteraction": "PASSIVE",
            "valueDensity": "NOT_DEFINED",
            "vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
            "version": "4.0",
            "vulnAvailabilityImpact": "HIGH",
            "vulnConfidentialityImpact": "HIGH",
            "vulnIntegrityImpact": "HIGH",
            "vulnerabilityResponseEffort": "NOT_DEFINED"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-787",
              "description": "CWE-787 Out-of-bounds Write",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-04-09T19:10:22.077Z",
        "orgId": "bca5b2e8-03a4-4781-b4ca-c6a078c0bfd4",
        "shortName": "NI"
      },
      "references": [
        {
          "url": "https://www.ni.com/en/support/security/available-critical-and-security-updates-for-ni-software/out-of-bounds-write-vulnerabilities-in-ni-labview.html"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "title": "Out of Bounds Write Vulnerability in NI LabVIEW in InitCPUInformation()",
      "x_generator": {
        "engine": "Vulnogram 0.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "bca5b2e8-03a4-4781-b4ca-c6a078c0bfd4",
    "assignerShortName": "NI",
    "cveId": "CVE-2025-2631",
    "datePublished": "2025-04-09T19:10:22.077Z",
    "dateReserved": "2025-03-21T21:12:45.558Z",
    "dateUpdated": "2025-04-09T19:32:46.740Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2025-2630 (GCVE-0-2025-2630)

Vulnerability from nvd – Published: 2025-04-09 18:50 – Updated: 2025-04-09 18:57
VLAI?
Summary
There is a DLL hijacking vulnerability due to an uncontrolled search path that exists in NI LabVIEW. This vulnerability may result in arbitrary code execution. Successful exploitation requires an attacker to insert a malicious DLL into the uncontrolled search path. This vulnerability affects NI LabVIEW 2025 Q1 and prior versions.
CWE
  • CWE-427 - Uncontrolled Search Path Element
Assigner
NI
Impacted products
Vendor Product Version
NI LabVIEW Affected: 0 , < 22.3.4 (semver)
Affected: 23.1.0 , < 23.3.5 (semver)
Affected: 24.1.0 , < 224.3.2 (semver)
Affected: 25.1.0 , < 25.1.1 (semver)
Create a notification for this product.
Credits
Mike Palafox from BLOOMY®
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-2630",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-04-09T18:57:32.231305Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-04-09T18:57:44.369Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "platforms": [
            "Windows"
          ],
          "product": "LabVIEW",
          "vendor": "NI",
          "versions": [
            {
              "lessThan": "22.3.4",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            },
            {
              "lessThan": "23.3.5",
              "status": "affected",
              "version": "23.1.0",
              "versionType": "semver"
            },
            {
              "lessThan": "224.3.2",
              "status": "affected",
              "version": "24.1.0",
              "versionType": "semver"
            },
            {
              "lessThan": "25.1.1",
              "status": "affected",
              "version": "25.1.0",
              "versionType": "semver"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "value": "Mike Palafox from BLOOMY\u00ae"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eThere is a DLL hijacking vulnerability due to an uncontrolled search path that exists in NI LabVIEW.  This vulnerability may result in arbitrary code execution.  Successful exploitation requires an attacker to insert a malicious DLL into the uncontrolled search path.  This vulnerability affects NI LabVIEW 2025 Q1 and prior versions.\u003c/span\u003e\u003cbr\u003e"
            }
          ],
          "value": "There is a DLL hijacking vulnerability due to an uncontrolled search path that exists in NI LabVIEW.  This vulnerability may result in arbitrary code execution.  Successful exploitation requires an attacker to insert a malicious DLL into the uncontrolled search path.  This vulnerability affects NI LabVIEW 2025 Q1 and prior versions."
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-471",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-471 Search Order Hijacking"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV4_0": {
            "Automatable": "NOT_DEFINED",
            "Recovery": "NOT_DEFINED",
            "Safety": "NOT_DEFINED",
            "attackComplexity": "LOW",
            "attackRequirements": "NONE",
            "attackVector": "LOCAL",
            "baseScore": 7,
            "baseSeverity": "HIGH",
            "privilegesRequired": "LOW",
            "providerUrgency": "NOT_DEFINED",
            "subAvailabilityImpact": "NONE",
            "subConfidentialityImpact": "NONE",
            "subIntegrityImpact": "NONE",
            "userInteraction": "PASSIVE",
            "valueDensity": "NOT_DEFINED",
            "vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
            "version": "4.0",
            "vulnAvailabilityImpact": "HIGH",
            "vulnConfidentialityImpact": "HIGH",
            "vulnIntegrityImpact": "HIGH",
            "vulnerabilityResponseEffort": "NOT_DEFINED"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        },
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.3,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-427",
              "description": "CWE-427 Uncontrolled Search Path Element",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-04-09T18:50:05.849Z",
        "orgId": "bca5b2e8-03a4-4781-b4ca-c6a078c0bfd4",
        "shortName": "NI"
      },
      "references": [
        {
          "url": "https://www.ni.com/en/support/security/available-critical-and-security-updates-for-ni-software/dll-hijacking-vulnerability-in-ni-labview.html"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "title": "DLL Hijacking Vulnerability in NI LabVIEW",
      "x_generator": {
        "engine": "Vulnogram 0.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "bca5b2e8-03a4-4781-b4ca-c6a078c0bfd4",
    "assignerShortName": "NI",
    "cveId": "CVE-2025-2630",
    "datePublished": "2025-04-09T18:50:05.849Z",
    "dateReserved": "2025-03-21T21:07:31.428Z",
    "dateUpdated": "2025-04-09T18:57:44.369Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2025-2629 (GCVE-0-2025-2629)

Vulnerability from nvd – Published: 2025-04-09 18:45 – Updated: 2025-04-09 18:58
VLAI?
Summary
There is a DLL hijacking vulnerability due to an uncontrolled search path that exists in NI LabVIEW when loading NI Error Reporting. This vulnerability may result in arbitrary code execution. Successful exploitation requires an attacker to insert a malicious DLL into the uncontrolled search path. This vulnerability affects NI LabVIEW 2025 Q1 and prior versions.
CWE
  • CWE-427 - Uncontrolled Search Path Element
Assigner
NI
Impacted products
Vendor Product Version
NI LabVIEW Affected: 0 , < 22.3.4 (semver)
Affected: 23.1.0 , < 223.3.5 (semver)
Affected: 24.1.0 , < 24.3.2 (sem)
Affected: 25.1.0 , < 25.1.1 (semver)
Create a notification for this product.
Credits
Mike Palafox from BLOOMY®
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-2629",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-04-09T18:58:34.817569Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-04-09T18:58:49.944Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "platforms": [
            "Windows"
          ],
          "product": "LabVIEW",
          "vendor": "NI",
          "versions": [
            {
              "lessThan": "22.3.4",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            },
            {
              "lessThan": "223.3.5",
              "status": "affected",
              "version": "23.1.0",
              "versionType": "semver"
            },
            {
              "lessThan": "24.3.2",
              "status": "affected",
              "version": "24.1.0",
              "versionType": "sem"
            },
            {
              "lessThan": "25.1.1",
              "status": "affected",
              "version": "25.1.0",
              "versionType": "semver"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "value": "Mike Palafox from BLOOMY\u00ae"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eThere is a DLL hijacking vulnerability due to an uncontrolled search path that exists in NI LabVIEW when loading NI Error Reporting.  This vulnerability may result in arbitrary code execution.  Successful exploitation requires an attacker to insert a malicious DLL into the uncontrolled search path.  This vulnerability affects NI LabVIEW 2025 Q1 and prior versions.\u003c/span\u003e\u003cbr\u003e"
            }
          ],
          "value": "There is a DLL hijacking vulnerability due to an uncontrolled search path that exists in NI LabVIEW when loading NI Error Reporting.  This vulnerability may result in arbitrary code execution.  Successful exploitation requires an attacker to insert a malicious DLL into the uncontrolled search path.  This vulnerability affects NI LabVIEW 2025 Q1 and prior versions."
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-471",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-471 Search Order Hijacking"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV4_0": {
            "Automatable": "NOT_DEFINED",
            "Recovery": "NOT_DEFINED",
            "Safety": "NOT_DEFINED",
            "attackComplexity": "LOW",
            "attackRequirements": "NONE",
            "attackVector": "LOCAL",
            "baseScore": 7,
            "baseSeverity": "HIGH",
            "privilegesRequired": "LOW",
            "providerUrgency": "NOT_DEFINED",
            "subAvailabilityImpact": "NONE",
            "subConfidentialityImpact": "NONE",
            "subIntegrityImpact": "NONE",
            "userInteraction": "PASSIVE",
            "valueDensity": "NOT_DEFINED",
            "vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
            "version": "4.0",
            "vulnAvailabilityImpact": "HIGH",
            "vulnConfidentialityImpact": "HIGH",
            "vulnIntegrityImpact": "HIGH",
            "vulnerabilityResponseEffort": "NOT_DEFINED"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        },
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.3,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-427",
              "description": "CWE-427 Uncontrolled Search Path Element",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-04-09T18:45:35.434Z",
        "orgId": "bca5b2e8-03a4-4781-b4ca-c6a078c0bfd4",
        "shortName": "NI"
      },
      "references": [
        {
          "url": "https://www.ni.com/en/support/security/available-critical-and-security-updates-for-ni-software/dll-hijacking-vulnerability-in-ni-labview-when-loading-ni-error-reporting.html"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "title": "DLL Hijacking Vulnerability in NI LabVIEW When Loading NI Error Reporting",
      "x_generator": {
        "engine": "Vulnogram 0.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "bca5b2e8-03a4-4781-b4ca-c6a078c0bfd4",
    "assignerShortName": "NI",
    "cveId": "CVE-2025-2629",
    "datePublished": "2025-04-09T18:45:35.434Z",
    "dateReserved": "2025-03-21T21:07:28.841Z",
    "dateUpdated": "2025-04-09T18:58:49.944Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

FKIE_CVE-2025-7849

Vulnerability from fkie_nvd - Published: 2025-07-29 22:15 - Updated: 2025-08-19 15:43
Summary
A memory corruption vulnerability due to improper error handling when a VILinkObj is null exists in NI LabVIEW that may result in arbitrary code execution. Successful exploitation requires an attacker to get a user to open a specially crafted VI. This vulnerability affects NI LabVIEW 2025 Q1 and prior versions.
Impacted products
Vendor Product Version
ni labview *
ni labview 2022
ni labview 2022
ni labview 2022
ni labview 2022
ni labview 2022
ni labview 2022
ni labview 2023
ni labview 2023
ni labview 2023
ni labview 2023
ni labview 2023
ni labview 2023
ni labview 2023
ni labview 2023
ni labview 2024
ni labview 2024
ni labview 2024
ni labview 2024
ni labview 2024
ni labview 2024
ni labview 2025
ni labview 2025
ni labview 2025

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:ni:labview:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "807AE6D5-8096-47A2-A47D-1A5EFC85652D",
              "versionEndIncluding": "2021",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ni:labview:2022:q1:*:*:*:*:*:*",
              "matchCriteriaId": "4D12D6CF-802F-47BA-ADF9-9E52C071BD7F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ni:labview:2022:q3:*:*:*:*:*:*",
              "matchCriteriaId": "340F61E5-D1ED-4C29-A894-8BC5C5B90ACE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ni:labview:2022:q3_patch1:*:*:*:*:*:*",
              "matchCriteriaId": "52CC3023-4913-40BA-B74C-786F32DC7551",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ni:labview:2022:q3_patch2:*:*:*:*:*:*",
              "matchCriteriaId": "FC150E98-5889-4A65-84B8-E4871091D104",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ni:labview:2022:q3_patch4:*:*:*:*:*:*",
              "matchCriteriaId": "85B3D429-4F3D-44CC-9304-837FB6D7E2A1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ni:labview:2022:q3_patch5:*:*:*:*:*:*",
              "matchCriteriaId": "1FB7783C-FCB2-4564-98CF-F76F848E8E86",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ni:labview:2023:q1:*:*:*:*:*:*",
              "matchCriteriaId": "D7DD2022-CFB7-4F38-B459-C1AFB55B5B68",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ni:labview:2023:q3:*:*:*:*:*:*",
              "matchCriteriaId": "18AB0B07-72FE-4861-B69D-AD2E87C5382E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ni:labview:2023:q3_patch1:*:*:*:*:*:*",
              "matchCriteriaId": "91928C9C-F094-4EE4-9FBE-2B7956D68E6F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ni:labview:2023:q3_patch2:*:*:*:*:*:*",
              "matchCriteriaId": "044C4B51-C641-41F2-ACA0-834C99D63285",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ni:labview:2023:q3_patch3:*:*:*:*:*:*",
              "matchCriteriaId": "26EEE5E3-AD37-4832-A66C-5F8F7A478F30",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ni:labview:2023:q3_patch4:*:*:*:*:*:*",
              "matchCriteriaId": "5DC20B17-C582-42C4-9780-5DC61B4AED91",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ni:labview:2023:q3_patch5:*:*:*:*:*:*",
              "matchCriteriaId": "329575A0-F12E-478B-9A83-F747D6A161AA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ni:labview:2023:q3_patch6:*:*:*:*:*:*",
              "matchCriteriaId": "F25A1816-08CA-4467-8025-AD57562D7C35",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ni:labview:2024:q1:*:*:*:*:*:*",
              "matchCriteriaId": "7753CCDF-BAF8-4F91-B85B-EBB2B88F6F30",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ni:labview:2024:q1_patch1:*:*:*:*:*:*",
              "matchCriteriaId": "953E8FD0-4420-4592-B696-C377D4EE0CA2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ni:labview:2024:q3:*:*:*:*:*:*",
              "matchCriteriaId": "5D99DCCD-511E-482E-8307-24382D1B621B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ni:labview:2024:q3_patch1:*:*:*:*:*:*",
              "matchCriteriaId": "600A4905-B888-454F-9DF6-1C09FB71DBE2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ni:labview:2024:q3_patch2:*:*:*:*:*:*",
              "matchCriteriaId": "AD79D082-AFF5-42CB-9D6C-12CF9A59D205",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ni:labview:2024:q3_patch3:*:*:*:*:*:*",
              "matchCriteriaId": "3B759A99-F766-4FE4-A1FF-A2D5026A6BD9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ni:labview:2025:q1:*:*:*:*:*:*",
              "matchCriteriaId": "FB0991CF-642F-46D2-9C47-9540347DC074",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ni:labview:2025:q1_patch1:*:*:*:*:*:*",
              "matchCriteriaId": "D776E6DE-2635-4172-B08D-B7FB2D1048F9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ni:labview:2025:q1_patch2:*:*:*:*:*:*",
              "matchCriteriaId": "55237E7D-9149-4204-A8FE-354CD2BC1220",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "A memory corruption vulnerability due to improper error handling when a VILinkObj is null exists in NI LabVIEW that may result in arbitrary code execution.  Successful exploitation requires an attacker to get a user to open a specially crafted VI.  This vulnerability affects NI LabVIEW 2025 Q1 and prior versions."
    },
    {
      "lang": "es",
      "value": "Existe una vulnerabilidad de corrupci\u00f3n de memoria en NI LabVIEW debido a la gesti\u00f3n incorrecta de errores cuando un VILinkObj es nulo. Esta vulnerabilidad puede provocar la ejecuci\u00f3n de c\u00f3digo arbitrario. Para explotarla con \u00e9xito, un atacante debe obligar al usuario a abrir un VI especialmente manipulado. Esta vulnerabilidad afecta a NI LabVIEW 2025 Q1 y versiones anteriores."
    }
  ],
  "id": "CVE-2025-7849",
  "lastModified": "2025-08-19T15:43:11.880",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 7.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 5.9,
        "source": "security@ni.com",
        "type": "Secondary"
      }
    ],
    "cvssMetricV40": [
      {
        "cvssData": {
          "Automatable": "NOT_DEFINED",
          "Recovery": "NOT_DEFINED",
          "Safety": "NOT_DEFINED",
          "attackComplexity": "LOW",
          "attackRequirements": "NONE",
          "attackVector": "LOCAL",
          "availabilityRequirement": "NOT_DEFINED",
          "baseScore": 8.5,
          "baseSeverity": "HIGH",
          "confidentialityRequirement": "NOT_DEFINED",
          "exploitMaturity": "NOT_DEFINED",
          "integrityRequirement": "NOT_DEFINED",
          "modifiedAttackComplexity": "NOT_DEFINED",
          "modifiedAttackRequirements": "NOT_DEFINED",
          "modifiedAttackVector": "NOT_DEFINED",
          "modifiedPrivilegesRequired": "NOT_DEFINED",
          "modifiedSubAvailabilityImpact": "NOT_DEFINED",
          "modifiedSubConfidentialityImpact": "NOT_DEFINED",
          "modifiedSubIntegrityImpact": "NOT_DEFINED",
          "modifiedUserInteraction": "NOT_DEFINED",
          "modifiedVulnAvailabilityImpact": "NOT_DEFINED",
          "modifiedVulnConfidentialityImpact": "NOT_DEFINED",
          "modifiedVulnIntegrityImpact": "NOT_DEFINED",
          "privilegesRequired": "NONE",
          "providerUrgency": "NOT_DEFINED",
          "subAvailabilityImpact": "NONE",
          "subConfidentialityImpact": "NONE",
          "subIntegrityImpact": "NONE",
          "userInteraction": "PASSIVE",
          "valueDensity": "NOT_DEFINED",
          "vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
          "version": "4.0",
          "vulnAvailabilityImpact": "HIGH",
          "vulnConfidentialityImpact": "HIGH",
          "vulnIntegrityImpact": "HIGH",
          "vulnerabilityResponseEffort": "NOT_DEFINED"
        },
        "source": "security@ni.com",
        "type": "Secondary"
      }
    ]
  },
  "published": "2025-07-29T22:15:26.030",
  "references": [
    {
      "source": "security@ni.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.ni.com/en/support/security/available-critical-and-security-updates-for-ni-software/memory-corruption-vulnerabilities-in-ni-labview.html"
    }
  ],
  "sourceIdentifier": "security@ni.com",
  "vulnStatus": "Analyzed",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-1285"
        }
      ],
      "source": "security@ni.com",
      "type": "Secondary"
    }
  ]
}

FKIE_CVE-2025-7848

Vulnerability from fkie_nvd - Published: 2025-07-29 22:15 - Updated: 2025-08-19 16:31
Summary
A memory corruption vulnerability due to improper input validation in lvpict.cpp exists in NI LabVIEW that may result in arbitrary code execution. Successful exploitation requires an attacker to get a user to open a specially crafted VI. This vulnerability affects NI LabVIEW 2025 Q1 and prior versions.
Impacted products
Vendor Product Version
ni labview *
ni labview 2022
ni labview 2022
ni labview 2022
ni labview 2022
ni labview 2022
ni labview 2022
ni labview 2023
ni labview 2023
ni labview 2023
ni labview 2023
ni labview 2023
ni labview 2023
ni labview 2023
ni labview 2023
ni labview 2024
ni labview 2024
ni labview 2024
ni labview 2024
ni labview 2024
ni labview 2024
ni labview 2025
ni labview 2025
ni labview 2025

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:ni:labview:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "807AE6D5-8096-47A2-A47D-1A5EFC85652D",
              "versionEndIncluding": "2021",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ni:labview:2022:q1:*:*:*:*:*:*",
              "matchCriteriaId": "4D12D6CF-802F-47BA-ADF9-9E52C071BD7F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ni:labview:2022:q3:*:*:*:*:*:*",
              "matchCriteriaId": "340F61E5-D1ED-4C29-A894-8BC5C5B90ACE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ni:labview:2022:q3_patch1:*:*:*:*:*:*",
              "matchCriteriaId": "52CC3023-4913-40BA-B74C-786F32DC7551",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ni:labview:2022:q3_patch2:*:*:*:*:*:*",
              "matchCriteriaId": "FC150E98-5889-4A65-84B8-E4871091D104",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ni:labview:2022:q3_patch4:*:*:*:*:*:*",
              "matchCriteriaId": "85B3D429-4F3D-44CC-9304-837FB6D7E2A1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ni:labview:2022:q3_patch5:*:*:*:*:*:*",
              "matchCriteriaId": "1FB7783C-FCB2-4564-98CF-F76F848E8E86",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ni:labview:2023:q1:*:*:*:*:*:*",
              "matchCriteriaId": "D7DD2022-CFB7-4F38-B459-C1AFB55B5B68",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ni:labview:2023:q3:*:*:*:*:*:*",
              "matchCriteriaId": "18AB0B07-72FE-4861-B69D-AD2E87C5382E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ni:labview:2023:q3_patch1:*:*:*:*:*:*",
              "matchCriteriaId": "91928C9C-F094-4EE4-9FBE-2B7956D68E6F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ni:labview:2023:q3_patch2:*:*:*:*:*:*",
              "matchCriteriaId": "044C4B51-C641-41F2-ACA0-834C99D63285",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ni:labview:2023:q3_patch3:*:*:*:*:*:*",
              "matchCriteriaId": "26EEE5E3-AD37-4832-A66C-5F8F7A478F30",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ni:labview:2023:q3_patch4:*:*:*:*:*:*",
              "matchCriteriaId": "5DC20B17-C582-42C4-9780-5DC61B4AED91",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ni:labview:2023:q3_patch5:*:*:*:*:*:*",
              "matchCriteriaId": "329575A0-F12E-478B-9A83-F747D6A161AA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ni:labview:2023:q3_patch6:*:*:*:*:*:*",
              "matchCriteriaId": "F25A1816-08CA-4467-8025-AD57562D7C35",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ni:labview:2024:q1:*:*:*:*:*:*",
              "matchCriteriaId": "7753CCDF-BAF8-4F91-B85B-EBB2B88F6F30",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ni:labview:2024:q1_patch1:*:*:*:*:*:*",
              "matchCriteriaId": "953E8FD0-4420-4592-B696-C377D4EE0CA2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ni:labview:2024:q3:*:*:*:*:*:*",
              "matchCriteriaId": "5D99DCCD-511E-482E-8307-24382D1B621B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ni:labview:2024:q3_patch1:*:*:*:*:*:*",
              "matchCriteriaId": "600A4905-B888-454F-9DF6-1C09FB71DBE2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ni:labview:2024:q3_patch2:*:*:*:*:*:*",
              "matchCriteriaId": "AD79D082-AFF5-42CB-9D6C-12CF9A59D205",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ni:labview:2024:q3_patch3:*:*:*:*:*:*",
              "matchCriteriaId": "3B759A99-F766-4FE4-A1FF-A2D5026A6BD9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ni:labview:2025:q1:*:*:*:*:*:*",
              "matchCriteriaId": "FB0991CF-642F-46D2-9C47-9540347DC074",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ni:labview:2025:q1_patch1:*:*:*:*:*:*",
              "matchCriteriaId": "D776E6DE-2635-4172-B08D-B7FB2D1048F9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ni:labview:2025:q1_patch2:*:*:*:*:*:*",
              "matchCriteriaId": "55237E7D-9149-4204-A8FE-354CD2BC1220",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "A memory corruption vulnerability due to improper input validation in lvpict.cpp exists in NI LabVIEW that may result in arbitrary code execution.  Successful exploitation requires an attacker to get a user to open a specially crafted VI.  This vulnerability affects NI LabVIEW 2025 Q1 and prior versions."
    },
    {
      "lang": "es",
      "value": "Existe una vulnerabilidad de corrupci\u00f3n de memoria en NI LabVIEW debido a una validaci\u00f3n de entrada incorrecta en lvpict.cpp que puede provocar la ejecuci\u00f3n de c\u00f3digo arbitrario. Para explotarla con \u00e9xito, un atacante debe obligar al usuario a abrir un VI especialmente manipulado. Esta vulnerabilidad afecta a NI LabVIEW 2025 Q1 y versiones anteriores."
    }
  ],
  "id": "CVE-2025-7848",
  "lastModified": "2025-08-19T16:31:04.400",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 7.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 5.9,
        "source": "security@ni.com",
        "type": "Secondary"
      }
    ],
    "cvssMetricV40": [
      {
        "cvssData": {
          "Automatable": "NOT_DEFINED",
          "Recovery": "NOT_DEFINED",
          "Safety": "NOT_DEFINED",
          "attackComplexity": "LOW",
          "attackRequirements": "NONE",
          "attackVector": "LOCAL",
          "availabilityRequirement": "NOT_DEFINED",
          "baseScore": 8.5,
          "baseSeverity": "HIGH",
          "confidentialityRequirement": "NOT_DEFINED",
          "exploitMaturity": "NOT_DEFINED",
          "integrityRequirement": "NOT_DEFINED",
          "modifiedAttackComplexity": "NOT_DEFINED",
          "modifiedAttackRequirements": "NOT_DEFINED",
          "modifiedAttackVector": "NOT_DEFINED",
          "modifiedPrivilegesRequired": "NOT_DEFINED",
          "modifiedSubAvailabilityImpact": "NOT_DEFINED",
          "modifiedSubConfidentialityImpact": "NOT_DEFINED",
          "modifiedSubIntegrityImpact": "NOT_DEFINED",
          "modifiedUserInteraction": "NOT_DEFINED",
          "modifiedVulnAvailabilityImpact": "NOT_DEFINED",
          "modifiedVulnConfidentialityImpact": "NOT_DEFINED",
          "modifiedVulnIntegrityImpact": "NOT_DEFINED",
          "privilegesRequired": "NONE",
          "providerUrgency": "NOT_DEFINED",
          "subAvailabilityImpact": "NONE",
          "subConfidentialityImpact": "NONE",
          "subIntegrityImpact": "NONE",
          "userInteraction": "PASSIVE",
          "valueDensity": "NOT_DEFINED",
          "vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
          "version": "4.0",
          "vulnAvailabilityImpact": "HIGH",
          "vulnConfidentialityImpact": "HIGH",
          "vulnIntegrityImpact": "HIGH",
          "vulnerabilityResponseEffort": "NOT_DEFINED"
        },
        "source": "security@ni.com",
        "type": "Secondary"
      }
    ]
  },
  "published": "2025-07-29T22:15:25.870",
  "references": [
    {
      "source": "security@ni.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.ni.com/en/support/security/available-critical-and-security-updates-for-ni-software/memory-corruption-vulnerabilities-in-ni-labview.html"
    }
  ],
  "sourceIdentifier": "security@ni.com",
  "vulnStatus": "Analyzed",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-1285"
        }
      ],
      "source": "security@ni.com",
      "type": "Secondary"
    }
  ]
}

FKIE_CVE-2025-7361

Vulnerability from fkie_nvd - Published: 2025-07-29 22:15 - Updated: 2025-08-19 16:20
Summary
A code injection vulnerability due to an improper initialization check exists in NI LabVIEW that may result in arbitrary code execution. Successful exploitation requires an attacker to get a user to open a specially crafted VI using a CIN node. This vulnerability affects 32-bit NI LabVIEW 2025 Q1 and prior versions. LabVIEW 64-bit versions do not support CIN nodes and are not affected.
Impacted products
Vendor Product Version
ni labview *
ni labview 2022
ni labview 2022
ni labview 2022
ni labview 2022
ni labview 2022
ni labview 2022
ni labview 2023
ni labview 2023
ni labview 2023
ni labview 2023
ni labview 2023
ni labview 2023
ni labview 2023
ni labview 2023
ni labview 2024
ni labview 2024
ni labview 2024
ni labview 2024
ni labview 2024
ni labview 2024
ni labview 2025
ni labview 2025
ni labview 2025
microsoft windows -

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:ni:labview:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "807AE6D5-8096-47A2-A47D-1A5EFC85652D",
              "versionEndIncluding": "2021",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ni:labview:2022:q1:*:*:*:*:*:*",
              "matchCriteriaId": "4D12D6CF-802F-47BA-ADF9-9E52C071BD7F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ni:labview:2022:q3:*:*:*:*:*:*",
              "matchCriteriaId": "340F61E5-D1ED-4C29-A894-8BC5C5B90ACE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ni:labview:2022:q3_patch1:*:*:*:*:*:*",
              "matchCriteriaId": "52CC3023-4913-40BA-B74C-786F32DC7551",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ni:labview:2022:q3_patch2:*:*:*:*:*:*",
              "matchCriteriaId": "FC150E98-5889-4A65-84B8-E4871091D104",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ni:labview:2022:q3_patch4:*:*:*:*:*:*",
              "matchCriteriaId": "85B3D429-4F3D-44CC-9304-837FB6D7E2A1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ni:labview:2022:q3_patch5:*:*:*:*:*:*",
              "matchCriteriaId": "1FB7783C-FCB2-4564-98CF-F76F848E8E86",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ni:labview:2023:q1:*:*:*:*:*:*",
              "matchCriteriaId": "D7DD2022-CFB7-4F38-B459-C1AFB55B5B68",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ni:labview:2023:q3:*:*:*:*:*:*",
              "matchCriteriaId": "18AB0B07-72FE-4861-B69D-AD2E87C5382E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ni:labview:2023:q3_patch1:*:*:*:*:*:*",
              "matchCriteriaId": "91928C9C-F094-4EE4-9FBE-2B7956D68E6F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ni:labview:2023:q3_patch2:*:*:*:*:*:*",
              "matchCriteriaId": "044C4B51-C641-41F2-ACA0-834C99D63285",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ni:labview:2023:q3_patch3:*:*:*:*:*:*",
              "matchCriteriaId": "26EEE5E3-AD37-4832-A66C-5F8F7A478F30",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ni:labview:2023:q3_patch4:*:*:*:*:*:*",
              "matchCriteriaId": "5DC20B17-C582-42C4-9780-5DC61B4AED91",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ni:labview:2023:q3_patch5:*:*:*:*:*:*",
              "matchCriteriaId": "329575A0-F12E-478B-9A83-F747D6A161AA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ni:labview:2023:q3_patch6:*:*:*:*:*:*",
              "matchCriteriaId": "F25A1816-08CA-4467-8025-AD57562D7C35",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ni:labview:2024:q1:*:*:*:*:*:*",
              "matchCriteriaId": "7753CCDF-BAF8-4F91-B85B-EBB2B88F6F30",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ni:labview:2024:q1_patch1:*:*:*:*:*:*",
              "matchCriteriaId": "953E8FD0-4420-4592-B696-C377D4EE0CA2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ni:labview:2024:q3:*:*:*:*:*:*",
              "matchCriteriaId": "5D99DCCD-511E-482E-8307-24382D1B621B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ni:labview:2024:q3_patch1:*:*:*:*:*:*",
              "matchCriteriaId": "600A4905-B888-454F-9DF6-1C09FB71DBE2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ni:labview:2024:q3_patch2:*:*:*:*:*:*",
              "matchCriteriaId": "AD79D082-AFF5-42CB-9D6C-12CF9A59D205",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ni:labview:2024:q3_patch3:*:*:*:*:*:*",
              "matchCriteriaId": "3B759A99-F766-4FE4-A1FF-A2D5026A6BD9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ni:labview:2025:q1:*:*:*:*:*:*",
              "matchCriteriaId": "FB0991CF-642F-46D2-9C47-9540347DC074",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ni:labview:2025:q1_patch1:*:*:*:*:*:*",
              "matchCriteriaId": "D776E6DE-2635-4172-B08D-B7FB2D1048F9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ni:labview:2025:q1_patch2:*:*:*:*:*:*",
              "matchCriteriaId": "55237E7D-9149-4204-A8FE-354CD2BC1220",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:x86:*",
              "matchCriteriaId": "60366048-32FE-4081-A852-04319FD7A52C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "A code injection vulnerability due to an improper initialization check exists in NI LabVIEW that may result in arbitrary code execution.  Successful exploitation requires an attacker to get a user to open a specially crafted VI using a CIN node.  This vulnerability affects 32-bit NI LabVIEW 2025 Q1 and prior versions.  LabVIEW 64-bit versions do not support CIN nodes and are not affected."
    },
    {
      "lang": "es",
      "value": "Existe una vulnerabilidad de inyecci\u00f3n de c\u00f3digo en NI LabVIEW debido a una comprobaci\u00f3n de inicializaci\u00f3n incorrecta que puede provocar la ejecuci\u00f3n de c\u00f3digo arbitrario. Para explotarla con \u00e9xito, un atacante debe obligar al usuario a abrir un VI especialmente manipulado mediante un nodo CIN. Esta vulnerabilidad afecta a NI LabVIEW 2025 Q1 de 32 bits y versiones anteriores. Las versiones de LabVIEW de 64 bits no son compatibles con nodos CIN y no se ven afectadas."
    }
  ],
  "id": "CVE-2025-7361",
  "lastModified": "2025-08-19T16:20:55.313",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 7.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 5.9,
        "source": "security@ni.com",
        "type": "Secondary"
      }
    ],
    "cvssMetricV40": [
      {
        "cvssData": {
          "Automatable": "NOT_DEFINED",
          "Recovery": "NOT_DEFINED",
          "Safety": "NOT_DEFINED",
          "attackComplexity": "LOW",
          "attackRequirements": "NONE",
          "attackVector": "LOCAL",
          "availabilityRequirement": "NOT_DEFINED",
          "baseScore": 8.5,
          "baseSeverity": "HIGH",
          "confidentialityRequirement": "NOT_DEFINED",
          "exploitMaturity": "NOT_DEFINED",
          "integrityRequirement": "NOT_DEFINED",
          "modifiedAttackComplexity": "NOT_DEFINED",
          "modifiedAttackRequirements": "NOT_DEFINED",
          "modifiedAttackVector": "NOT_DEFINED",
          "modifiedPrivilegesRequired": "NOT_DEFINED",
          "modifiedSubAvailabilityImpact": "NOT_DEFINED",
          "modifiedSubConfidentialityImpact": "NOT_DEFINED",
          "modifiedSubIntegrityImpact": "NOT_DEFINED",
          "modifiedUserInteraction": "NOT_DEFINED",
          "modifiedVulnAvailabilityImpact": "NOT_DEFINED",
          "modifiedVulnConfidentialityImpact": "NOT_DEFINED",
          "modifiedVulnIntegrityImpact": "NOT_DEFINED",
          "privilegesRequired": "NONE",
          "providerUrgency": "NOT_DEFINED",
          "subAvailabilityImpact": "NONE",
          "subConfidentialityImpact": "NONE",
          "subIntegrityImpact": "NONE",
          "userInteraction": "PASSIVE",
          "valueDensity": "NOT_DEFINED",
          "vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
          "version": "4.0",
          "vulnAvailabilityImpact": "HIGH",
          "vulnConfidentialityImpact": "HIGH",
          "vulnIntegrityImpact": "HIGH",
          "vulnerabilityResponseEffort": "NOT_DEFINED"
        },
        "source": "security@ni.com",
        "type": "Secondary"
      }
    ]
  },
  "published": "2025-07-29T22:15:25.710",
  "references": [
    {
      "source": "security@ni.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.ni.com/en/support/security/available-critical-and-security-updates-for-ni-software/code-injection-vulnerability-in-ni-labview-using-cin-nodes.html"
    }
  ],
  "sourceIdentifier": "security@ni.com",
  "vulnStatus": "Analyzed",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-94"
        }
      ],
      "source": "security@ni.com",
      "type": "Secondary"
    }
  ]
}

FKIE_CVE-2025-2634

Vulnerability from fkie_nvd - Published: 2025-07-23 16:15 - Updated: 2025-08-19 16:14
Summary
Out of bounds read vulnerability due to improper bounds checking in NI LabVIEW in fontmgr may result in information disclosure or arbitrary code execution. Successful exploitation requires an attacker to get a user to open a specially crafted VI. This vulnerability affects NI LabVIEW 2025 Q1 and prior versions.
Impacted products
Vendor Product Version
ni labview *
ni labview 2022
ni labview 2022
ni labview 2022
ni labview 2022
ni labview 2022
ni labview 2022
ni labview 2023
ni labview 2023
ni labview 2023
ni labview 2023
ni labview 2023
ni labview 2023
ni labview 2023
ni labview 2023
ni labview 2024
ni labview 2024
ni labview 2024
ni labview 2024
ni labview 2024
ni labview 2024
ni labview 2025
ni labview 2025
ni labview 2025

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:ni:labview:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "807AE6D5-8096-47A2-A47D-1A5EFC85652D",
              "versionEndIncluding": "2021",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ni:labview:2022:q1:*:*:*:*:*:*",
              "matchCriteriaId": "4D12D6CF-802F-47BA-ADF9-9E52C071BD7F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ni:labview:2022:q3:*:*:*:*:*:*",
              "matchCriteriaId": "340F61E5-D1ED-4C29-A894-8BC5C5B90ACE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ni:labview:2022:q3_patch1:*:*:*:*:*:*",
              "matchCriteriaId": "52CC3023-4913-40BA-B74C-786F32DC7551",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ni:labview:2022:q3_patch2:*:*:*:*:*:*",
              "matchCriteriaId": "FC150E98-5889-4A65-84B8-E4871091D104",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ni:labview:2022:q3_patch4:*:*:*:*:*:*",
              "matchCriteriaId": "85B3D429-4F3D-44CC-9304-837FB6D7E2A1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ni:labview:2022:q3_patch5:*:*:*:*:*:*",
              "matchCriteriaId": "1FB7783C-FCB2-4564-98CF-F76F848E8E86",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ni:labview:2023:q1:*:*:*:*:*:*",
              "matchCriteriaId": "D7DD2022-CFB7-4F38-B459-C1AFB55B5B68",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ni:labview:2023:q3:*:*:*:*:*:*",
              "matchCriteriaId": "18AB0B07-72FE-4861-B69D-AD2E87C5382E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ni:labview:2023:q3_patch1:*:*:*:*:*:*",
              "matchCriteriaId": "91928C9C-F094-4EE4-9FBE-2B7956D68E6F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ni:labview:2023:q3_patch2:*:*:*:*:*:*",
              "matchCriteriaId": "044C4B51-C641-41F2-ACA0-834C99D63285",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ni:labview:2023:q3_patch3:*:*:*:*:*:*",
              "matchCriteriaId": "26EEE5E3-AD37-4832-A66C-5F8F7A478F30",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ni:labview:2023:q3_patch4:*:*:*:*:*:*",
              "matchCriteriaId": "5DC20B17-C582-42C4-9780-5DC61B4AED91",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ni:labview:2023:q3_patch5:*:*:*:*:*:*",
              "matchCriteriaId": "329575A0-F12E-478B-9A83-F747D6A161AA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ni:labview:2023:q3_patch6:*:*:*:*:*:*",
              "matchCriteriaId": "F25A1816-08CA-4467-8025-AD57562D7C35",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ni:labview:2024:q1:*:*:*:*:*:*",
              "matchCriteriaId": "7753CCDF-BAF8-4F91-B85B-EBB2B88F6F30",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ni:labview:2024:q1_patch1:*:*:*:*:*:*",
              "matchCriteriaId": "953E8FD0-4420-4592-B696-C377D4EE0CA2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ni:labview:2024:q3:*:*:*:*:*:*",
              "matchCriteriaId": "5D99DCCD-511E-482E-8307-24382D1B621B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ni:labview:2024:q3_patch1:*:*:*:*:*:*",
              "matchCriteriaId": "600A4905-B888-454F-9DF6-1C09FB71DBE2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ni:labview:2024:q3_patch2:*:*:*:*:*:*",
              "matchCriteriaId": "AD79D082-AFF5-42CB-9D6C-12CF9A59D205",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ni:labview:2024:q3_patch3:*:*:*:*:*:*",
              "matchCriteriaId": "3B759A99-F766-4FE4-A1FF-A2D5026A6BD9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ni:labview:2025:q1:*:*:*:*:*:*",
              "matchCriteriaId": "FB0991CF-642F-46D2-9C47-9540347DC074",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ni:labview:2025:q1_patch1:*:*:*:*:*:*",
              "matchCriteriaId": "D776E6DE-2635-4172-B08D-B7FB2D1048F9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ni:labview:2025:q1_patch2:*:*:*:*:*:*",
              "matchCriteriaId": "55237E7D-9149-4204-A8FE-354CD2BC1220",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Out of bounds read vulnerability due to improper bounds checking in NI LabVIEW in fontmgr may result in information disclosure or arbitrary code execution.  Successful exploitation requires an attacker to get a user to open a specially crafted VI.  This vulnerability affects NI LabVIEW 2025 Q1 and prior versions."
    },
    {
      "lang": "es",
      "value": "Una vulnerabilidad de lectura fuera de los l\u00edmites, debida a una comprobaci\u00f3n incorrecta de los l\u00edmites en NI LabVIEW en fontmgr, puede provocar la divulgaci\u00f3n de informaci\u00f3n o la ejecuci\u00f3n de c\u00f3digo arbitrario. Para explotarla con \u00e9xito, el atacante debe obligar al usuario a abrir un VI especialmente manipulado. Esta vulnerabilidad afecta a NI LabVIEW 2025 Q1 y versiones anteriores."
    }
  ],
  "id": "CVE-2025-2634",
  "lastModified": "2025-08-19T16:14:55.217",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 7.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 5.9,
        "source": "security@ni.com",
        "type": "Secondary"
      }
    ],
    "cvssMetricV40": [
      {
        "cvssData": {
          "Automatable": "NOT_DEFINED",
          "Recovery": "NOT_DEFINED",
          "Safety": "NOT_DEFINED",
          "attackComplexity": "LOW",
          "attackRequirements": "PRESENT",
          "attackVector": "LOCAL",
          "availabilityRequirement": "NOT_DEFINED",
          "baseScore": 7.3,
          "baseSeverity": "HIGH",
          "confidentialityRequirement": "NOT_DEFINED",
          "exploitMaturity": "NOT_DEFINED",
          "integrityRequirement": "NOT_DEFINED",
          "modifiedAttackComplexity": "NOT_DEFINED",
          "modifiedAttackRequirements": "NOT_DEFINED",
          "modifiedAttackVector": "NOT_DEFINED",
          "modifiedPrivilegesRequired": "NOT_DEFINED",
          "modifiedSubAvailabilityImpact": "NOT_DEFINED",
          "modifiedSubConfidentialityImpact": "NOT_DEFINED",
          "modifiedSubIntegrityImpact": "NOT_DEFINED",
          "modifiedUserInteraction": "NOT_DEFINED",
          "modifiedVulnAvailabilityImpact": "NOT_DEFINED",
          "modifiedVulnConfidentialityImpact": "NOT_DEFINED",
          "modifiedVulnIntegrityImpact": "NOT_DEFINED",
          "privilegesRequired": "NONE",
          "providerUrgency": "NOT_DEFINED",
          "subAvailabilityImpact": "NONE",
          "subConfidentialityImpact": "NONE",
          "subIntegrityImpact": "NONE",
          "userInteraction": "PASSIVE",
          "valueDensity": "NOT_DEFINED",
          "vectorString": "CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
          "version": "4.0",
          "vulnAvailabilityImpact": "HIGH",
          "vulnConfidentialityImpact": "HIGH",
          "vulnIntegrityImpact": "HIGH",
          "vulnerabilityResponseEffort": "NOT_DEFINED"
        },
        "source": "security@ni.com",
        "type": "Secondary"
      }
    ]
  },
  "published": "2025-07-23T16:15:25.620",
  "references": [
    {
      "source": "security@ni.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.ni.com/en/support/security/available-critical-and-security-updates-for-ni-software/out-of-bounds-read-vulnerabilities-in-ni-labview.html"
    }
  ],
  "sourceIdentifier": "security@ni.com",
  "vulnStatus": "Analyzed",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-1285"
        }
      ],
      "source": "security@ni.com",
      "type": "Secondary"
    }
  ]
}

FKIE_CVE-2025-2633

Vulnerability from fkie_nvd - Published: 2025-07-23 16:15 - Updated: 2025-08-19 16:11
Summary
Out of bounds read vulnerability due to improper bounds checking in NI LabVIEW in lvre!UDecStrToNum that may result in information disclosure or arbitrary code execution. Successful exploitation requires an attacker to get a user to open a specially crafted VI. This vulnerability affects NI LabVIEW 2025 Q1 and prior versions.
Impacted products
Vendor Product Version
ni labview *
ni labview 2022
ni labview 2022
ni labview 2022
ni labview 2022
ni labview 2022
ni labview 2022
ni labview 2023
ni labview 2023
ni labview 2023
ni labview 2023
ni labview 2023
ni labview 2023
ni labview 2023
ni labview 2023
ni labview 2024
ni labview 2024
ni labview 2024
ni labview 2024
ni labview 2024
ni labview 2024
ni labview 2025
ni labview 2025
ni labview 2025

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:ni:labview:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "807AE6D5-8096-47A2-A47D-1A5EFC85652D",
              "versionEndIncluding": "2021",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ni:labview:2022:q1:*:*:*:*:*:*",
              "matchCriteriaId": "4D12D6CF-802F-47BA-ADF9-9E52C071BD7F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ni:labview:2022:q3:*:*:*:*:*:*",
              "matchCriteriaId": "340F61E5-D1ED-4C29-A894-8BC5C5B90ACE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ni:labview:2022:q3_patch1:*:*:*:*:*:*",
              "matchCriteriaId": "52CC3023-4913-40BA-B74C-786F32DC7551",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ni:labview:2022:q3_patch2:*:*:*:*:*:*",
              "matchCriteriaId": "FC150E98-5889-4A65-84B8-E4871091D104",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ni:labview:2022:q3_patch4:*:*:*:*:*:*",
              "matchCriteriaId": "85B3D429-4F3D-44CC-9304-837FB6D7E2A1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ni:labview:2022:q3_patch5:*:*:*:*:*:*",
              "matchCriteriaId": "1FB7783C-FCB2-4564-98CF-F76F848E8E86",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ni:labview:2023:q1:*:*:*:*:*:*",
              "matchCriteriaId": "D7DD2022-CFB7-4F38-B459-C1AFB55B5B68",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ni:labview:2023:q3:*:*:*:*:*:*",
              "matchCriteriaId": "18AB0B07-72FE-4861-B69D-AD2E87C5382E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ni:labview:2023:q3_patch1:*:*:*:*:*:*",
              "matchCriteriaId": "91928C9C-F094-4EE4-9FBE-2B7956D68E6F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ni:labview:2023:q3_patch2:*:*:*:*:*:*",
              "matchCriteriaId": "044C4B51-C641-41F2-ACA0-834C99D63285",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ni:labview:2023:q3_patch3:*:*:*:*:*:*",
              "matchCriteriaId": "26EEE5E3-AD37-4832-A66C-5F8F7A478F30",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ni:labview:2023:q3_patch4:*:*:*:*:*:*",
              "matchCriteriaId": "5DC20B17-C582-42C4-9780-5DC61B4AED91",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ni:labview:2023:q3_patch5:*:*:*:*:*:*",
              "matchCriteriaId": "329575A0-F12E-478B-9A83-F747D6A161AA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ni:labview:2023:q3_patch6:*:*:*:*:*:*",
              "matchCriteriaId": "F25A1816-08CA-4467-8025-AD57562D7C35",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ni:labview:2024:q1:*:*:*:*:*:*",
              "matchCriteriaId": "7753CCDF-BAF8-4F91-B85B-EBB2B88F6F30",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ni:labview:2024:q1_patch1:*:*:*:*:*:*",
              "matchCriteriaId": "953E8FD0-4420-4592-B696-C377D4EE0CA2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ni:labview:2024:q3:*:*:*:*:*:*",
              "matchCriteriaId": "5D99DCCD-511E-482E-8307-24382D1B621B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ni:labview:2024:q3_patch1:*:*:*:*:*:*",
              "matchCriteriaId": "600A4905-B888-454F-9DF6-1C09FB71DBE2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ni:labview:2024:q3_patch2:*:*:*:*:*:*",
              "matchCriteriaId": "AD79D082-AFF5-42CB-9D6C-12CF9A59D205",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ni:labview:2024:q3_patch3:*:*:*:*:*:*",
              "matchCriteriaId": "3B759A99-F766-4FE4-A1FF-A2D5026A6BD9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ni:labview:2025:q1:*:*:*:*:*:*",
              "matchCriteriaId": "FB0991CF-642F-46D2-9C47-9540347DC074",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ni:labview:2025:q1_patch1:*:*:*:*:*:*",
              "matchCriteriaId": "D776E6DE-2635-4172-B08D-B7FB2D1048F9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ni:labview:2025:q1_patch2:*:*:*:*:*:*",
              "matchCriteriaId": "55237E7D-9149-4204-A8FE-354CD2BC1220",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Out of bounds read vulnerability due to improper bounds checking in NI LabVIEW in lvre!UDecStrToNum that may result in information disclosure or arbitrary code execution.  Successful exploitation requires an attacker to get a user to open a specially crafted VI.  This vulnerability affects NI LabVIEW 2025 Q1 and prior versions."
    },
    {
      "lang": "es",
      "value": "Vulnerabilidad de lectura fuera de los l\u00edmites debido a una comprobaci\u00f3n incorrecta de los l\u00edmites en NI LabVIEW en lvre!UDecStrToNum, que puede provocar la divulgaci\u00f3n de informaci\u00f3n o la ejecuci\u00f3n de c\u00f3digo arbitrario. Para explotarla con \u00e9xito, el atacante debe obligar al usuario a abrir un VI especialmente manipulado. Esta vulnerabilidad afecta a NI LabVIEW 2025 Q1 y versiones anteriores."
    }
  ],
  "id": "CVE-2025-2633",
  "lastModified": "2025-08-19T16:11:46.920",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 7.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 5.9,
        "source": "security@ni.com",
        "type": "Secondary"
      }
    ],
    "cvssMetricV40": [
      {
        "cvssData": {
          "Automatable": "NOT_DEFINED",
          "Recovery": "NOT_DEFINED",
          "Safety": "NOT_DEFINED",
          "attackComplexity": "LOW",
          "attackRequirements": "PRESENT",
          "attackVector": "LOCAL",
          "availabilityRequirement": "NOT_DEFINED",
          "baseScore": 7.3,
          "baseSeverity": "HIGH",
          "confidentialityRequirement": "NOT_DEFINED",
          "exploitMaturity": "NOT_DEFINED",
          "integrityRequirement": "NOT_DEFINED",
          "modifiedAttackComplexity": "NOT_DEFINED",
          "modifiedAttackRequirements": "NOT_DEFINED",
          "modifiedAttackVector": "NOT_DEFINED",
          "modifiedPrivilegesRequired": "NOT_DEFINED",
          "modifiedSubAvailabilityImpact": "NOT_DEFINED",
          "modifiedSubConfidentialityImpact": "NOT_DEFINED",
          "modifiedSubIntegrityImpact": "NOT_DEFINED",
          "modifiedUserInteraction": "NOT_DEFINED",
          "modifiedVulnAvailabilityImpact": "NOT_DEFINED",
          "modifiedVulnConfidentialityImpact": "NOT_DEFINED",
          "modifiedVulnIntegrityImpact": "NOT_DEFINED",
          "privilegesRequired": "NONE",
          "providerUrgency": "NOT_DEFINED",
          "subAvailabilityImpact": "NONE",
          "subConfidentialityImpact": "NONE",
          "subIntegrityImpact": "NONE",
          "userInteraction": "PASSIVE",
          "valueDensity": "NOT_DEFINED",
          "vectorString": "CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
          "version": "4.0",
          "vulnAvailabilityImpact": "HIGH",
          "vulnConfidentialityImpact": "HIGH",
          "vulnIntegrityImpact": "HIGH",
          "vulnerabilityResponseEffort": "NOT_DEFINED"
        },
        "source": "security@ni.com",
        "type": "Secondary"
      }
    ]
  },
  "published": "2025-07-23T16:15:25.013",
  "references": [
    {
      "source": "security@ni.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.ni.com/en/support/security/available-critical-and-security-updates-for-ni-software/out-of-bounds-read-vulnerabilities-in-ni-labview.html"
    }
  ],
  "sourceIdentifier": "security@ni.com",
  "vulnStatus": "Analyzed",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-1285"
        }
      ],
      "source": "security@ni.com",
      "type": "Secondary"
    }
  ]
}

FKIE_CVE-2025-2631

Vulnerability from fkie_nvd - Published: 2025-04-09 20:15 - Updated: 2025-08-18 19:36
Summary
Out of bounds write vulnerability due to improper bounds checking in NI LabVIEW in InitCPUInformation() that may result in information disclosure or arbitrary code execution. Successful exploitation requires an attacker to get a user to open a specially crafted VI. This vulnerability affects NI LabVIEW 2025 Q1 and prior versions.
Impacted products
Vendor Product Version
ni labview *
ni labview 2022
ni labview 2022
ni labview 2022
ni labview 2022
ni labview 2022
ni labview 2023
ni labview 2023
ni labview 2023
ni labview 2023
ni labview 2023
ni labview 2023
ni labview 2023
ni labview 2024
ni labview 2024
ni labview 2024
ni labview 2024
ni labview 2024
ni labview 2025
ni labview 2025

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:ni:labview:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "807AE6D5-8096-47A2-A47D-1A5EFC85652D",
              "versionEndIncluding": "2021",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ni:labview:2022:q1:*:*:*:*:*:*",
              "matchCriteriaId": "4D12D6CF-802F-47BA-ADF9-9E52C071BD7F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ni:labview:2022:q3:*:*:*:*:*:*",
              "matchCriteriaId": "340F61E5-D1ED-4C29-A894-8BC5C5B90ACE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ni:labview:2022:q3_patch1:*:*:*:*:*:*",
              "matchCriteriaId": "52CC3023-4913-40BA-B74C-786F32DC7551",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ni:labview:2022:q3_patch2:*:*:*:*:*:*",
              "matchCriteriaId": "FC150E98-5889-4A65-84B8-E4871091D104",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ni:labview:2022:q3_patch4:*:*:*:*:*:*",
              "matchCriteriaId": "85B3D429-4F3D-44CC-9304-837FB6D7E2A1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ni:labview:2023:q1:*:*:*:*:*:*",
              "matchCriteriaId": "D7DD2022-CFB7-4F38-B459-C1AFB55B5B68",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ni:labview:2023:q3:*:*:*:*:*:*",
              "matchCriteriaId": "18AB0B07-72FE-4861-B69D-AD2E87C5382E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ni:labview:2023:q3_patch1:*:*:*:*:*:*",
              "matchCriteriaId": "91928C9C-F094-4EE4-9FBE-2B7956D68E6F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ni:labview:2023:q3_patch2:*:*:*:*:*:*",
              "matchCriteriaId": "044C4B51-C641-41F2-ACA0-834C99D63285",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ni:labview:2023:q3_patch3:*:*:*:*:*:*",
              "matchCriteriaId": "26EEE5E3-AD37-4832-A66C-5F8F7A478F30",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ni:labview:2023:q3_patch4:*:*:*:*:*:*",
              "matchCriteriaId": "5DC20B17-C582-42C4-9780-5DC61B4AED91",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ni:labview:2023:q3_patch5:*:*:*:*:*:*",
              "matchCriteriaId": "329575A0-F12E-478B-9A83-F747D6A161AA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ni:labview:2024:q1:*:*:*:*:*:*",
              "matchCriteriaId": "7753CCDF-BAF8-4F91-B85B-EBB2B88F6F30",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ni:labview:2024:q1_patch1:*:*:*:*:*:*",
              "matchCriteriaId": "953E8FD0-4420-4592-B696-C377D4EE0CA2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ni:labview:2024:q3:*:*:*:*:*:*",
              "matchCriteriaId": "5D99DCCD-511E-482E-8307-24382D1B621B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ni:labview:2024:q3_patch1:*:*:*:*:*:*",
              "matchCriteriaId": "600A4905-B888-454F-9DF6-1C09FB71DBE2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ni:labview:2024:q3_patch2:*:*:*:*:*:*",
              "matchCriteriaId": "AD79D082-AFF5-42CB-9D6C-12CF9A59D205",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ni:labview:2025:q1:*:*:*:*:*:*",
              "matchCriteriaId": "FB0991CF-642F-46D2-9C47-9540347DC074",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ni:labview:2025:q1_patch1:*:*:*:*:*:*",
              "matchCriteriaId": "D776E6DE-2635-4172-B08D-B7FB2D1048F9",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Out of bounds write vulnerability due to improper bounds checking in NI LabVIEW in InitCPUInformation() that may result in information disclosure or arbitrary code execution.  Successful exploitation requires an attacker to get a user to open a specially crafted VI.  This vulnerability affects NI LabVIEW 2025 Q1 and prior versions."
    },
    {
      "lang": "es",
      "value": "Vulnerabilidad de escritura fuera de los l\u00edmites debido a una comprobaci\u00f3n incorrecta de los l\u00edmites en NI LabVIEW en InitCPUInformation(), que puede provocar la divulgaci\u00f3n de informaci\u00f3n o la ejecuci\u00f3n de c\u00f3digo arbitrario. Para explotarla con \u00e9xito, el atacante debe obligar al usuario a abrir un VI especialmente manipulado. Esta vulnerabilidad afecta a NI LabVIEW 2025 Q1 y versiones anteriores."
    }
  ],
  "id": "CVE-2025-2631",
  "lastModified": "2025-08-18T19:36:03.480",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 7.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 5.9,
        "source": "security@ni.com",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 7.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ],
    "cvssMetricV40": [
      {
        "cvssData": {
          "Automatable": "NOT_DEFINED",
          "Recovery": "NOT_DEFINED",
          "Safety": "NOT_DEFINED",
          "attackComplexity": "LOW",
          "attackRequirements": "NONE",
          "attackVector": "LOCAL",
          "availabilityRequirement": "NOT_DEFINED",
          "baseScore": 8.5,
          "baseSeverity": "HIGH",
          "confidentialityRequirement": "NOT_DEFINED",
          "exploitMaturity": "NOT_DEFINED",
          "integrityRequirement": "NOT_DEFINED",
          "modifiedAttackComplexity": "NOT_DEFINED",
          "modifiedAttackRequirements": "NOT_DEFINED",
          "modifiedAttackVector": "NOT_DEFINED",
          "modifiedPrivilegesRequired": "NOT_DEFINED",
          "modifiedSubAvailabilityImpact": "NOT_DEFINED",
          "modifiedSubConfidentialityImpact": "NOT_DEFINED",
          "modifiedSubIntegrityImpact": "NOT_DEFINED",
          "modifiedUserInteraction": "NOT_DEFINED",
          "modifiedVulnAvailabilityImpact": "NOT_DEFINED",
          "modifiedVulnConfidentialityImpact": "NOT_DEFINED",
          "modifiedVulnIntegrityImpact": "NOT_DEFINED",
          "privilegesRequired": "NONE",
          "providerUrgency": "NOT_DEFINED",
          "subAvailabilityImpact": "NONE",
          "subConfidentialityImpact": "NONE",
          "subIntegrityImpact": "NONE",
          "userInteraction": "PASSIVE",
          "valueDensity": "NOT_DEFINED",
          "vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
          "version": "4.0",
          "vulnAvailabilityImpact": "HIGH",
          "vulnConfidentialityImpact": "HIGH",
          "vulnIntegrityImpact": "HIGH",
          "vulnerabilityResponseEffort": "NOT_DEFINED"
        },
        "source": "security@ni.com",
        "type": "Secondary"
      }
    ]
  },
  "published": "2025-04-09T20:15:27.183",
  "references": [
    {
      "source": "security@ni.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.ni.com/en/support/security/available-critical-and-security-updates-for-ni-software/out-of-bounds-write-vulnerabilities-in-ni-labview.html"
    }
  ],
  "sourceIdentifier": "security@ni.com",
  "vulnStatus": "Analyzed",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-787"
        }
      ],
      "source": "security@ni.com",
      "type": "Secondary"
    }
  ]
}

FKIE_CVE-2025-2632

Vulnerability from fkie_nvd - Published: 2025-04-09 20:15 - Updated: 2025-08-18 19:33
Summary
Out of bounds write vulnerability due to improper bounds checking in NI LabVIEW reading CPU info from cache that may result in information disclosure or arbitrary code execution. Successful exploitation requires an attacker to get a user to open a specially crafted VI. This vulnerability affects NI LabVIEW 2025 Q1 and prior versions.
Impacted products
Vendor Product Version
ni labview *
ni labview 2022
ni labview 2022
ni labview 2022
ni labview 2022
ni labview 2022
ni labview 2023
ni labview 2023
ni labview 2023
ni labview 2023
ni labview 2023
ni labview 2023
ni labview 2023
ni labview 2024
ni labview 2024
ni labview 2024
ni labview 2024
ni labview 2024
ni labview 2025
ni labview 2025

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:ni:labview:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "807AE6D5-8096-47A2-A47D-1A5EFC85652D",
              "versionEndIncluding": "2021",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ni:labview:2022:q1:*:*:*:*:*:*",
              "matchCriteriaId": "4D12D6CF-802F-47BA-ADF9-9E52C071BD7F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ni:labview:2022:q3:*:*:*:*:*:*",
              "matchCriteriaId": "340F61E5-D1ED-4C29-A894-8BC5C5B90ACE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ni:labview:2022:q3_patch1:*:*:*:*:*:*",
              "matchCriteriaId": "52CC3023-4913-40BA-B74C-786F32DC7551",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ni:labview:2022:q3_patch2:*:*:*:*:*:*",
              "matchCriteriaId": "FC150E98-5889-4A65-84B8-E4871091D104",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ni:labview:2022:q3_patch4:*:*:*:*:*:*",
              "matchCriteriaId": "85B3D429-4F3D-44CC-9304-837FB6D7E2A1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ni:labview:2023:q1:*:*:*:*:*:*",
              "matchCriteriaId": "D7DD2022-CFB7-4F38-B459-C1AFB55B5B68",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ni:labview:2023:q3:*:*:*:*:*:*",
              "matchCriteriaId": "18AB0B07-72FE-4861-B69D-AD2E87C5382E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ni:labview:2023:q3_patch1:*:*:*:*:*:*",
              "matchCriteriaId": "91928C9C-F094-4EE4-9FBE-2B7956D68E6F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ni:labview:2023:q3_patch2:*:*:*:*:*:*",
              "matchCriteriaId": "044C4B51-C641-41F2-ACA0-834C99D63285",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ni:labview:2023:q3_patch3:*:*:*:*:*:*",
              "matchCriteriaId": "26EEE5E3-AD37-4832-A66C-5F8F7A478F30",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ni:labview:2023:q3_patch4:*:*:*:*:*:*",
              "matchCriteriaId": "5DC20B17-C582-42C4-9780-5DC61B4AED91",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ni:labview:2023:q3_patch5:*:*:*:*:*:*",
              "matchCriteriaId": "329575A0-F12E-478B-9A83-F747D6A161AA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ni:labview:2024:q1:*:*:*:*:*:*",
              "matchCriteriaId": "7753CCDF-BAF8-4F91-B85B-EBB2B88F6F30",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ni:labview:2024:q1_patch1:*:*:*:*:*:*",
              "matchCriteriaId": "953E8FD0-4420-4592-B696-C377D4EE0CA2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ni:labview:2024:q3:*:*:*:*:*:*",
              "matchCriteriaId": "5D99DCCD-511E-482E-8307-24382D1B621B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ni:labview:2024:q3_patch1:*:*:*:*:*:*",
              "matchCriteriaId": "600A4905-B888-454F-9DF6-1C09FB71DBE2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ni:labview:2024:q3_patch2:*:*:*:*:*:*",
              "matchCriteriaId": "AD79D082-AFF5-42CB-9D6C-12CF9A59D205",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ni:labview:2025:q1:*:*:*:*:*:*",
              "matchCriteriaId": "FB0991CF-642F-46D2-9C47-9540347DC074",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ni:labview:2025:q1_patch1:*:*:*:*:*:*",
              "matchCriteriaId": "D776E6DE-2635-4172-B08D-B7FB2D1048F9",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Out of bounds write vulnerability due to improper bounds checking in NI LabVIEW reading CPU info from cache that may result in information disclosure or arbitrary code execution.  Successful exploitation requires an attacker to get a user to open a specially crafted VI.  This vulnerability affects NI LabVIEW 2025 Q1 and prior versions."
    },
    {
      "lang": "es",
      "value": "Vulnerabilidad de escritura fuera de los l\u00edmites debido a una comprobaci\u00f3n incorrecta de los l\u00edmites en NI LabVIEW al leer informaci\u00f3n de la CPU desde la cach\u00e9, lo que puede provocar la divulgaci\u00f3n de informaci\u00f3n o la ejecuci\u00f3n de c\u00f3digo arbitrario. Para explotarla con \u00e9xito, el atacante debe obligar al usuario a abrir un VI especialmente manipulado. Esta vulnerabilidad afecta a NI LabVIEW 2025 Q1 y versiones anteriores."
    }
  ],
  "id": "CVE-2025-2632",
  "lastModified": "2025-08-18T19:33:43.857",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 7.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 5.9,
        "source": "security@ni.com",
        "type": "Secondary"
      }
    ],
    "cvssMetricV40": [
      {
        "cvssData": {
          "Automatable": "NOT_DEFINED",
          "Recovery": "NOT_DEFINED",
          "Safety": "NOT_DEFINED",
          "attackComplexity": "LOW",
          "attackRequirements": "NONE",
          "attackVector": "LOCAL",
          "availabilityRequirement": "NOT_DEFINED",
          "baseScore": 8.5,
          "baseSeverity": "HIGH",
          "confidentialityRequirement": "NOT_DEFINED",
          "exploitMaturity": "NOT_DEFINED",
          "integrityRequirement": "NOT_DEFINED",
          "modifiedAttackComplexity": "NOT_DEFINED",
          "modifiedAttackRequirements": "NOT_DEFINED",
          "modifiedAttackVector": "NOT_DEFINED",
          "modifiedPrivilegesRequired": "NOT_DEFINED",
          "modifiedSubAvailabilityImpact": "NOT_DEFINED",
          "modifiedSubConfidentialityImpact": "NOT_DEFINED",
          "modifiedSubIntegrityImpact": "NOT_DEFINED",
          "modifiedUserInteraction": "NOT_DEFINED",
          "modifiedVulnAvailabilityImpact": "NOT_DEFINED",
          "modifiedVulnConfidentialityImpact": "NOT_DEFINED",
          "modifiedVulnIntegrityImpact": "NOT_DEFINED",
          "privilegesRequired": "NONE",
          "providerUrgency": "NOT_DEFINED",
          "subAvailabilityImpact": "NONE",
          "subConfidentialityImpact": "NONE",
          "subIntegrityImpact": "NONE",
          "userInteraction": "PASSIVE",
          "valueDensity": "NOT_DEFINED",
          "vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
          "version": "4.0",
          "vulnAvailabilityImpact": "HIGH",
          "vulnConfidentialityImpact": "HIGH",
          "vulnIntegrityImpact": "HIGH",
          "vulnerabilityResponseEffort": "NOT_DEFINED"
        },
        "source": "security@ni.com",
        "type": "Secondary"
      }
    ]
  },
  "published": "2025-04-09T20:15:27.350",
  "references": [
    {
      "source": "security@ni.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.ni.com/en/support/security/available-critical-and-security-updates-for-ni-software/out-of-bounds-write-vulnerabilities-in-ni-labview.html"
    }
  ],
  "sourceIdentifier": "security@ni.com",
  "vulnStatus": "Analyzed",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-787"
        }
      ],
      "source": "security@ni.com",
      "type": "Secondary"
    }
  ]
}

FKIE_CVE-2025-2630

Vulnerability from fkie_nvd - Published: 2025-04-09 19:15 - Updated: 2025-08-18 19:40
Summary
There is a DLL hijacking vulnerability due to an uncontrolled search path that exists in NI LabVIEW. This vulnerability may result in arbitrary code execution. Successful exploitation requires an attacker to insert a malicious DLL into the uncontrolled search path. This vulnerability affects NI LabVIEW 2025 Q1 and prior versions.
Impacted products
Vendor Product Version
ni labview *
ni labview 2022
ni labview 2022
ni labview 2022
ni labview 2022
ni labview 2022
ni labview 2023
ni labview 2023
ni labview 2023
ni labview 2023
ni labview 2023
ni labview 2023
ni labview 2023
ni labview 2024
ni labview 2024
ni labview 2024
ni labview 2024
ni labview 2024
ni labview 2025
ni labview 2025

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:ni:labview:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "807AE6D5-8096-47A2-A47D-1A5EFC85652D",
              "versionEndIncluding": "2021",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ni:labview:2022:q1:*:*:*:*:*:*",
              "matchCriteriaId": "4D12D6CF-802F-47BA-ADF9-9E52C071BD7F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ni:labview:2022:q3:*:*:*:*:*:*",
              "matchCriteriaId": "340F61E5-D1ED-4C29-A894-8BC5C5B90ACE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ni:labview:2022:q3_patch1:*:*:*:*:*:*",
              "matchCriteriaId": "52CC3023-4913-40BA-B74C-786F32DC7551",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ni:labview:2022:q3_patch2:*:*:*:*:*:*",
              "matchCriteriaId": "FC150E98-5889-4A65-84B8-E4871091D104",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ni:labview:2022:q3_patch4:*:*:*:*:*:*",
              "matchCriteriaId": "85B3D429-4F3D-44CC-9304-837FB6D7E2A1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ni:labview:2023:q1:*:*:*:*:*:*",
              "matchCriteriaId": "D7DD2022-CFB7-4F38-B459-C1AFB55B5B68",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ni:labview:2023:q3:*:*:*:*:*:*",
              "matchCriteriaId": "18AB0B07-72FE-4861-B69D-AD2E87C5382E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ni:labview:2023:q3_patch1:*:*:*:*:*:*",
              "matchCriteriaId": "91928C9C-F094-4EE4-9FBE-2B7956D68E6F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ni:labview:2023:q3_patch2:*:*:*:*:*:*",
              "matchCriteriaId": "044C4B51-C641-41F2-ACA0-834C99D63285",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ni:labview:2023:q3_patch3:*:*:*:*:*:*",
              "matchCriteriaId": "26EEE5E3-AD37-4832-A66C-5F8F7A478F30",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ni:labview:2023:q3_patch4:*:*:*:*:*:*",
              "matchCriteriaId": "5DC20B17-C582-42C4-9780-5DC61B4AED91",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ni:labview:2023:q3_patch5:*:*:*:*:*:*",
              "matchCriteriaId": "329575A0-F12E-478B-9A83-F747D6A161AA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ni:labview:2024:q1:*:*:*:*:*:*",
              "matchCriteriaId": "7753CCDF-BAF8-4F91-B85B-EBB2B88F6F30",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ni:labview:2024:q1_patch1:*:*:*:*:*:*",
              "matchCriteriaId": "953E8FD0-4420-4592-B696-C377D4EE0CA2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ni:labview:2024:q3:*:*:*:*:*:*",
              "matchCriteriaId": "5D99DCCD-511E-482E-8307-24382D1B621B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ni:labview:2024:q3_patch1:*:*:*:*:*:*",
              "matchCriteriaId": "600A4905-B888-454F-9DF6-1C09FB71DBE2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ni:labview:2024:q3_patch2:*:*:*:*:*:*",
              "matchCriteriaId": "AD79D082-AFF5-42CB-9D6C-12CF9A59D205",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ni:labview:2025:q1:*:*:*:*:*:*",
              "matchCriteriaId": "FB0991CF-642F-46D2-9C47-9540347DC074",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ni:labview:2025:q1_patch1:*:*:*:*:*:*",
              "matchCriteriaId": "D776E6DE-2635-4172-B08D-B7FB2D1048F9",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "There is a DLL hijacking vulnerability due to an uncontrolled search path that exists in NI LabVIEW.  This vulnerability may result in arbitrary code execution.  Successful exploitation requires an attacker to insert a malicious DLL into the uncontrolled search path.  This vulnerability affects NI LabVIEW 2025 Q1 and prior versions."
    },
    {
      "lang": "es",
      "value": "Existe una vulnerabilidad de secuestro de DLL debido a una ruta de b\u00fasqueda no controlada en NI LabVIEW. Esta vulnerabilidad puede provocar la ejecuci\u00f3n de c\u00f3digo arbitrario. Para explotarla correctamente, un atacante debe insertar una DLL maliciosa en la ruta de b\u00fasqueda no controlada. Esta vulnerabilidad afecta a NI LabVIEW 2025 Q1 y versiones anteriores."
    }
  ],
  "id": "CVE-2025-2630",
  "lastModified": "2025-08-18T19:40:32.253",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 7.3,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.3,
        "impactScore": 5.9,
        "source": "security@ni.com",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 7.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ],
    "cvssMetricV40": [
      {
        "cvssData": {
          "Automatable": "NOT_DEFINED",
          "Recovery": "NOT_DEFINED",
          "Safety": "NOT_DEFINED",
          "attackComplexity": "LOW",
          "attackRequirements": "NONE",
          "attackVector": "LOCAL",
          "availabilityRequirement": "NOT_DEFINED",
          "baseScore": 7.0,
          "baseSeverity": "HIGH",
          "confidentialityRequirement": "NOT_DEFINED",
          "exploitMaturity": "NOT_DEFINED",
          "integrityRequirement": "NOT_DEFINED",
          "modifiedAttackComplexity": "NOT_DEFINED",
          "modifiedAttackRequirements": "NOT_DEFINED",
          "modifiedAttackVector": "NOT_DEFINED",
          "modifiedPrivilegesRequired": "NOT_DEFINED",
          "modifiedSubAvailabilityImpact": "NOT_DEFINED",
          "modifiedSubConfidentialityImpact": "NOT_DEFINED",
          "modifiedSubIntegrityImpact": "NOT_DEFINED",
          "modifiedUserInteraction": "NOT_DEFINED",
          "modifiedVulnAvailabilityImpact": "NOT_DEFINED",
          "modifiedVulnConfidentialityImpact": "NOT_DEFINED",
          "modifiedVulnIntegrityImpact": "NOT_DEFINED",
          "privilegesRequired": "LOW",
          "providerUrgency": "NOT_DEFINED",
          "subAvailabilityImpact": "NONE",
          "subConfidentialityImpact": "NONE",
          "subIntegrityImpact": "NONE",
          "userInteraction": "PASSIVE",
          "valueDensity": "NOT_DEFINED",
          "vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
          "version": "4.0",
          "vulnAvailabilityImpact": "HIGH",
          "vulnConfidentialityImpact": "HIGH",
          "vulnIntegrityImpact": "HIGH",
          "vulnerabilityResponseEffort": "NOT_DEFINED"
        },
        "source": "security@ni.com",
        "type": "Secondary"
      }
    ]
  },
  "published": "2025-04-09T19:15:48.490",
  "references": [
    {
      "source": "security@ni.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.ni.com/en/support/security/available-critical-and-security-updates-for-ni-software/dll-hijacking-vulnerability-in-ni-labview.html"
    }
  ],
  "sourceIdentifier": "security@ni.com",
  "vulnStatus": "Analyzed",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-427"
        }
      ],
      "source": "security@ni.com",
      "type": "Secondary"
    }
  ]
}

FKIE_CVE-2025-2629

Vulnerability from fkie_nvd - Published: 2025-04-09 19:15 - Updated: 2025-08-18 19:47
Summary
There is a DLL hijacking vulnerability due to an uncontrolled search path that exists in NI LabVIEW when loading NI Error Reporting. This vulnerability may result in arbitrary code execution. Successful exploitation requires an attacker to insert a malicious DLL into the uncontrolled search path. This vulnerability affects NI LabVIEW 2025 Q1 and prior versions.
Impacted products
Vendor Product Version
ni labview *
ni labview 2022
ni labview 2022
ni labview 2022
ni labview 2022
ni labview 2022
ni labview 2023
ni labview 2023
ni labview 2023
ni labview 2023
ni labview 2023
ni labview 2023
ni labview 2023
ni labview 2024
ni labview 2024
ni labview 2024
ni labview 2024
ni labview 2024
ni labview 2025
ni labview 2025

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:ni:labview:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "807AE6D5-8096-47A2-A47D-1A5EFC85652D",
              "versionEndIncluding": "2021",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ni:labview:2022:q1:*:*:*:*:*:*",
              "matchCriteriaId": "4D12D6CF-802F-47BA-ADF9-9E52C071BD7F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ni:labview:2022:q3:*:*:*:*:*:*",
              "matchCriteriaId": "340F61E5-D1ED-4C29-A894-8BC5C5B90ACE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ni:labview:2022:q3_patch1:*:*:*:*:*:*",
              "matchCriteriaId": "52CC3023-4913-40BA-B74C-786F32DC7551",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ni:labview:2022:q3_patch2:*:*:*:*:*:*",
              "matchCriteriaId": "FC150E98-5889-4A65-84B8-E4871091D104",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ni:labview:2022:q3_patch4:*:*:*:*:*:*",
              "matchCriteriaId": "85B3D429-4F3D-44CC-9304-837FB6D7E2A1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ni:labview:2023:q1:*:*:*:*:*:*",
              "matchCriteriaId": "D7DD2022-CFB7-4F38-B459-C1AFB55B5B68",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ni:labview:2023:q3:*:*:*:*:*:*",
              "matchCriteriaId": "18AB0B07-72FE-4861-B69D-AD2E87C5382E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ni:labview:2023:q3_patch1:*:*:*:*:*:*",
              "matchCriteriaId": "91928C9C-F094-4EE4-9FBE-2B7956D68E6F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ni:labview:2023:q3_patch2:*:*:*:*:*:*",
              "matchCriteriaId": "044C4B51-C641-41F2-ACA0-834C99D63285",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ni:labview:2023:q3_patch3:*:*:*:*:*:*",
              "matchCriteriaId": "26EEE5E3-AD37-4832-A66C-5F8F7A478F30",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ni:labview:2023:q3_patch4:*:*:*:*:*:*",
              "matchCriteriaId": "5DC20B17-C582-42C4-9780-5DC61B4AED91",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ni:labview:2023:q3_patch5:*:*:*:*:*:*",
              "matchCriteriaId": "329575A0-F12E-478B-9A83-F747D6A161AA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ni:labview:2024:q1:*:*:*:*:*:*",
              "matchCriteriaId": "7753CCDF-BAF8-4F91-B85B-EBB2B88F6F30",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ni:labview:2024:q1_patch1:*:*:*:*:*:*",
              "matchCriteriaId": "953E8FD0-4420-4592-B696-C377D4EE0CA2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ni:labview:2024:q3:*:*:*:*:*:*",
              "matchCriteriaId": "5D99DCCD-511E-482E-8307-24382D1B621B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ni:labview:2024:q3_patch1:*:*:*:*:*:*",
              "matchCriteriaId": "600A4905-B888-454F-9DF6-1C09FB71DBE2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ni:labview:2024:q3_patch2:*:*:*:*:*:*",
              "matchCriteriaId": "AD79D082-AFF5-42CB-9D6C-12CF9A59D205",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ni:labview:2025:q1:*:*:*:*:*:*",
              "matchCriteriaId": "FB0991CF-642F-46D2-9C47-9540347DC074",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ni:labview:2025:q1_patch1:*:*:*:*:*:*",
              "matchCriteriaId": "D776E6DE-2635-4172-B08D-B7FB2D1048F9",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "There is a DLL hijacking vulnerability due to an uncontrolled search path that exists in NI LabVIEW when loading NI Error Reporting.  This vulnerability may result in arbitrary code execution.  Successful exploitation requires an attacker to insert a malicious DLL into the uncontrolled search path.  This vulnerability affects NI LabVIEW 2025 Q1 and prior versions."
    },
    {
      "lang": "es",
      "value": "Existe una vulnerabilidad de secuestro de DLL debido a una ruta de b\u00fasqueda no controlada en NI LabVIEW al cargar NI Error Reporting. Esta vulnerabilidad puede provocar la ejecuci\u00f3n de c\u00f3digo arbitrario. Para explotarla correctamente, un atacante debe insertar una DLL maliciosa en la ruta de b\u00fasqueda no controlada. Esta vulnerabilidad afecta a NI LabVIEW 2025 Q1 y versiones anteriores."
    }
  ],
  "id": "CVE-2025-2629",
  "lastModified": "2025-08-18T19:47:18.057",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 7.3,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.3,
        "impactScore": 5.9,
        "source": "security@ni.com",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 7.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ],
    "cvssMetricV40": [
      {
        "cvssData": {
          "Automatable": "NOT_DEFINED",
          "Recovery": "NOT_DEFINED",
          "Safety": "NOT_DEFINED",
          "attackComplexity": "LOW",
          "attackRequirements": "NONE",
          "attackVector": "LOCAL",
          "availabilityRequirement": "NOT_DEFINED",
          "baseScore": 7.0,
          "baseSeverity": "HIGH",
          "confidentialityRequirement": "NOT_DEFINED",
          "exploitMaturity": "NOT_DEFINED",
          "integrityRequirement": "NOT_DEFINED",
          "modifiedAttackComplexity": "NOT_DEFINED",
          "modifiedAttackRequirements": "NOT_DEFINED",
          "modifiedAttackVector": "NOT_DEFINED",
          "modifiedPrivilegesRequired": "NOT_DEFINED",
          "modifiedSubAvailabilityImpact": "NOT_DEFINED",
          "modifiedSubConfidentialityImpact": "NOT_DEFINED",
          "modifiedSubIntegrityImpact": "NOT_DEFINED",
          "modifiedUserInteraction": "NOT_DEFINED",
          "modifiedVulnAvailabilityImpact": "NOT_DEFINED",
          "modifiedVulnConfidentialityImpact": "NOT_DEFINED",
          "modifiedVulnIntegrityImpact": "NOT_DEFINED",
          "privilegesRequired": "LOW",
          "providerUrgency": "NOT_DEFINED",
          "subAvailabilityImpact": "NONE",
          "subConfidentialityImpact": "NONE",
          "subIntegrityImpact": "NONE",
          "userInteraction": "PASSIVE",
          "valueDensity": "NOT_DEFINED",
          "vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
          "version": "4.0",
          "vulnAvailabilityImpact": "HIGH",
          "vulnConfidentialityImpact": "HIGH",
          "vulnIntegrityImpact": "HIGH",
          "vulnerabilityResponseEffort": "NOT_DEFINED"
        },
        "source": "security@ni.com",
        "type": "Secondary"
      }
    ]
  },
  "published": "2025-04-09T19:15:48.320",
  "references": [
    {
      "source": "security@ni.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.ni.com/en/support/security/available-critical-and-security-updates-for-ni-software/dll-hijacking-vulnerability-in-ni-labview-when-loading-ni-error-reporting.html"
    }
  ],
  "sourceIdentifier": "security@ni.com",
  "vulnStatus": "Analyzed",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-427"
        }
      ],
      "source": "security@ni.com",
      "type": "Secondary"
    }
  ]
}

FKIE_CVE-2024-10495

Vulnerability from fkie_nvd - Published: 2024-12-10 16:15 - Updated: 2025-03-04 18:37
Summary
An out of bounds read due to improper input validation when loading the font table in fontmgr.cpp in NI LabVIEW may disclose information or result in arbitrary code execution. Successful exploitation requires an attacker to provide a user with a specially crafted VI. This vulnerability affects LabVIEW 2024 Q3 and prior versions.
Impacted products
Vendor Product Version
ni labview *
ni labview 2022
ni labview 2022
ni labview 2022
ni labview 2022
ni labview 2023
ni labview 2023
ni labview 2023
ni labview 2023
ni labview 2023
ni labview 2023
ni labview 2024
ni labview 2024
ni labview 2024
ni labview 2024

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:ni:labview:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "807AE6D5-8096-47A2-A47D-1A5EFC85652D",
              "versionEndIncluding": "2021",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ni:labview:2022:q1:*:*:*:*:*:*",
              "matchCriteriaId": "4D12D6CF-802F-47BA-ADF9-9E52C071BD7F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ni:labview:2022:q3:*:*:*:*:*:*",
              "matchCriteriaId": "340F61E5-D1ED-4C29-A894-8BC5C5B90ACE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ni:labview:2022:q3_patch1:*:*:*:*:*:*",
              "matchCriteriaId": "52CC3023-4913-40BA-B74C-786F32DC7551",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ni:labview:2022:q3_patch2:*:*:*:*:*:*",
              "matchCriteriaId": "FC150E98-5889-4A65-84B8-E4871091D104",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ni:labview:2023:q1:*:*:*:*:*:*",
              "matchCriteriaId": "D7DD2022-CFB7-4F38-B459-C1AFB55B5B68",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ni:labview:2023:q3:*:*:*:*:*:*",
              "matchCriteriaId": "18AB0B07-72FE-4861-B69D-AD2E87C5382E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ni:labview:2023:q3_patch1:*:*:*:*:*:*",
              "matchCriteriaId": "91928C9C-F094-4EE4-9FBE-2B7956D68E6F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ni:labview:2023:q3_patch2:*:*:*:*:*:*",
              "matchCriteriaId": "044C4B51-C641-41F2-ACA0-834C99D63285",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ni:labview:2023:q3_patch3:*:*:*:*:*:*",
              "matchCriteriaId": "26EEE5E3-AD37-4832-A66C-5F8F7A478F30",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ni:labview:2023:q3_patch4:*:*:*:*:*:*",
              "matchCriteriaId": "5DC20B17-C582-42C4-9780-5DC61B4AED91",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ni:labview:2024:q1:*:*:*:*:*:*",
              "matchCriteriaId": "7753CCDF-BAF8-4F91-B85B-EBB2B88F6F30",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ni:labview:2024:q1_patch1:*:*:*:*:*:*",
              "matchCriteriaId": "953E8FD0-4420-4592-B696-C377D4EE0CA2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ni:labview:2024:q3:*:*:*:*:*:*",
              "matchCriteriaId": "5D99DCCD-511E-482E-8307-24382D1B621B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ni:labview:2024:q3_patch1:*:*:*:*:*:*",
              "matchCriteriaId": "600A4905-B888-454F-9DF6-1C09FB71DBE2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "An out of bounds read due to improper input validation when loading the font table in fontmgr.cpp in NI LabVIEW may disclose information or result in arbitrary code execution.  Successful exploitation requires an attacker to provide a user with a specially crafted VI.  This vulnerability affects LabVIEW 2024 Q3 and prior versions."
    },
    {
      "lang": "es",
      "value": "Una lectura fuera de los l\u00edmites debido a una validaci\u00f3n de entrada incorrecta al cargar la tabla de fuentes en fontmgr.cpp en NI LabVIEW puede revelar informaci\u00f3n o provocar la ejecuci\u00f3n de c\u00f3digo arbitrario. Para explotarla con \u00e9xito, es necesario que un atacante proporcione a un usuario un VI especialmente manipulado. Esta vulnerabilidad afecta a LabVIEW 2024 Q3 y versiones anteriores."
    }
  ],
  "id": "CVE-2024-10495",
  "lastModified": "2025-03-04T18:37:45.737",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 7.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 5.9,
        "source": "security@ni.com",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 7.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ],
    "cvssMetricV40": [
      {
        "cvssData": {
          "Automatable": "NOT_DEFINED",
          "Recovery": "NOT_DEFINED",
          "Safety": "NOT_DEFINED",
          "attackComplexity": "LOW",
          "attackRequirements": "NONE",
          "attackVector": "LOCAL",
          "availabilityRequirement": "NOT_DEFINED",
          "baseScore": 8.4,
          "baseSeverity": "HIGH",
          "confidentialityRequirement": "NOT_DEFINED",
          "exploitMaturity": "NOT_DEFINED",
          "integrityRequirement": "NOT_DEFINED",
          "modifiedAttackComplexity": "NOT_DEFINED",
          "modifiedAttackRequirements": "NOT_DEFINED",
          "modifiedAttackVector": "NOT_DEFINED",
          "modifiedPrivilegesRequired": "NOT_DEFINED",
          "modifiedSubAvailabilityImpact": "NOT_DEFINED",
          "modifiedSubConfidentialityImpact": "NOT_DEFINED",
          "modifiedSubIntegrityImpact": "NOT_DEFINED",
          "modifiedUserInteraction": "NOT_DEFINED",
          "modifiedVulnAvailabilityImpact": "NOT_DEFINED",
          "modifiedVulnConfidentialityImpact": "NOT_DEFINED",
          "modifiedVulnIntegrityImpact": "NOT_DEFINED",
          "privilegesRequired": "NONE",
          "providerUrgency": "NOT_DEFINED",
          "subAvailabilityImpact": "NONE",
          "subConfidentialityImpact": "LOW",
          "subIntegrityImpact": "LOW",
          "userInteraction": "ACTIVE",
          "valueDensity": "NOT_DEFINED",
          "vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:L/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
          "version": "4.0",
          "vulnAvailabilityImpact": "HIGH",
          "vulnConfidentialityImpact": "HIGH",
          "vulnIntegrityImpact": "HIGH",
          "vulnerabilityResponseEffort": "NOT_DEFINED"
        },
        "source": "security@ni.com",
        "type": "Secondary"
      }
    ]
  },
  "published": "2024-12-10T16:15:22.080",
  "references": [
    {
      "source": "security@ni.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.ni.com/en/support/security/available-critical-and-security-updates-for-ni-software/out-of-bounds-read-vulnerabilities-in-ni-labview-.html"
    }
  ],
  "sourceIdentifier": "security@ni.com",
  "vulnStatus": "Analyzed",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-1285"
        }
      ],
      "source": "security@ni.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-125"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}